Feb 9 19:14:35.953765 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 9 19:14:35.953801 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 19:14:35.953824 kernel: efi: EFI v2.70 by EDK II Feb 9 19:14:35.953840 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 9 19:14:35.953853 kernel: ACPI: Early table checksum verification disabled Feb 9 19:14:35.953867 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 9 19:14:35.953882 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 9 19:14:35.953897 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 19:14:35.953910 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 9 19:14:35.953924 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 19:14:35.953942 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 9 19:14:35.953956 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 9 19:14:35.953970 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 9 19:14:35.953984 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 19:14:35.954000 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 9 19:14:35.954019 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 9 19:14:35.954034 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 9 19:14:35.954048 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 9 19:14:35.954063 kernel: printk: bootconsole [uart0] enabled Feb 9 19:14:35.954077 kernel: NUMA: Failed to initialise from firmware Feb 9 19:14:35.954114 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 19:14:35.954130 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 9 19:14:35.954145 kernel: Zone ranges: Feb 9 19:14:35.954160 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 9 19:14:35.954175 kernel: DMA32 empty Feb 9 19:14:35.954189 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 9 19:14:35.954209 kernel: Movable zone start for each node Feb 9 19:14:35.954223 kernel: Early memory node ranges Feb 9 19:14:35.954238 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 9 19:14:35.954275 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 9 19:14:35.954293 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 9 19:14:35.954307 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 9 19:14:35.954322 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 9 19:14:35.954336 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 9 19:14:35.954351 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 19:14:35.954366 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 9 19:14:35.954380 kernel: psci: probing for conduit method from ACPI. Feb 9 19:14:35.954394 kernel: psci: PSCIv1.0 detected in firmware. Feb 9 19:14:35.954414 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 19:14:35.954429 kernel: psci: Trusted OS migration not required Feb 9 19:14:35.954450 kernel: psci: SMC Calling Convention v1.1 Feb 9 19:14:35.954465 kernel: ACPI: SRAT not present Feb 9 19:14:35.954481 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 19:14:35.954500 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 19:14:35.954516 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 19:14:35.954531 kernel: Detected PIPT I-cache on CPU0 Feb 9 19:14:35.954546 kernel: CPU features: detected: GIC system register CPU interface Feb 9 19:14:35.954561 kernel: CPU features: detected: Spectre-v2 Feb 9 19:14:35.954576 kernel: CPU features: detected: Spectre-v3a Feb 9 19:14:35.954591 kernel: CPU features: detected: Spectre-BHB Feb 9 19:14:35.954607 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 19:14:35.954622 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 19:14:35.954638 kernel: CPU features: detected: ARM erratum 1742098 Feb 9 19:14:35.954653 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 9 19:14:35.954672 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 9 19:14:35.954687 kernel: Policy zone: Normal Feb 9 19:14:35.954705 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 19:14:35.954721 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:14:35.954737 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:14:35.954752 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:14:35.954768 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:14:35.954783 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 9 19:14:35.954799 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 9 19:14:35.954814 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:14:35.954833 kernel: trace event string verifier disabled Feb 9 19:14:35.954849 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 19:14:35.954865 kernel: rcu: RCU event tracing is enabled. Feb 9 19:14:35.954881 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:14:35.954896 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 19:14:35.954912 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:14:35.954927 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:14:35.954943 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:14:35.954958 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 19:14:35.954973 kernel: GICv3: 96 SPIs implemented Feb 9 19:14:35.954988 kernel: GICv3: 0 Extended SPIs implemented Feb 9 19:14:35.955003 kernel: GICv3: Distributor has no Range Selector support Feb 9 19:14:35.955022 kernel: Root IRQ handler: gic_handle_irq Feb 9 19:14:35.955037 kernel: GICv3: 16 PPIs implemented Feb 9 19:14:35.955052 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 9 19:14:35.955067 kernel: ACPI: SRAT not present Feb 9 19:14:35.955082 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 9 19:14:35.955097 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 19:14:35.955112 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 9 19:14:35.955128 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 9 19:14:35.955143 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 9 19:14:35.955158 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 9 19:14:35.955173 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 9 19:14:35.955193 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 9 19:14:35.955208 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 9 19:14:35.955224 kernel: Console: colour dummy device 80x25 Feb 9 19:14:35.955239 kernel: printk: console [tty1] enabled Feb 9 19:14:35.956799 kernel: ACPI: Core revision 20210730 Feb 9 19:14:35.956820 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 9 19:14:35.956837 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:14:35.956852 kernel: LSM: Security Framework initializing Feb 9 19:14:35.956868 kernel: SELinux: Initializing. Feb 9 19:14:35.956884 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:14:35.956907 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:14:35.956922 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:14:35.956938 kernel: Platform MSI: ITS@0x10080000 domain created Feb 9 19:14:35.956953 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 9 19:14:35.956969 kernel: Remapping and enabling EFI services. Feb 9 19:14:35.956984 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:14:35.957000 kernel: Detected PIPT I-cache on CPU1 Feb 9 19:14:35.957016 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 9 19:14:35.957032 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 9 19:14:35.957052 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 9 19:14:35.957067 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:14:35.957083 kernel: SMP: Total of 2 processors activated. Feb 9 19:14:35.957098 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 19:14:35.957114 kernel: CPU features: detected: 32-bit EL1 Support Feb 9 19:14:35.957130 kernel: CPU features: detected: CRC32 instructions Feb 9 19:14:35.957145 kernel: CPU: All CPU(s) started at EL1 Feb 9 19:14:35.957160 kernel: alternatives: patching kernel code Feb 9 19:14:35.957176 kernel: devtmpfs: initialized Feb 9 19:14:35.957195 kernel: KASLR disabled due to lack of seed Feb 9 19:14:35.957211 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:14:35.957227 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:14:35.957284 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:14:35.957309 kernel: SMBIOS 3.0.0 present. Feb 9 19:14:35.957326 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 9 19:14:35.957342 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:14:35.957358 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 19:14:35.957375 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 19:14:35.957391 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 19:14:35.957407 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:14:35.957424 kernel: audit: type=2000 audit(0.247:1): state=initialized audit_enabled=0 res=1 Feb 9 19:14:35.957444 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:14:35.957461 kernel: cpuidle: using governor menu Feb 9 19:14:35.957477 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 19:14:35.957493 kernel: ASID allocator initialised with 32768 entries Feb 9 19:14:35.957509 kernel: ACPI: bus type PCI registered Feb 9 19:14:35.957530 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:14:35.957546 kernel: Serial: AMBA PL011 UART driver Feb 9 19:14:35.957562 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:14:35.957578 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 19:14:35.957595 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:14:35.957611 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 19:14:35.957627 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:14:35.957643 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 19:14:35.957659 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:14:35.957679 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:14:35.957696 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:14:35.957712 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:14:35.957728 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:14:35.957744 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:14:35.957761 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:14:35.957777 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:14:35.957793 kernel: ACPI: Interpreter enabled Feb 9 19:14:35.957809 kernel: ACPI: Using GIC for interrupt routing Feb 9 19:14:35.957829 kernel: ACPI: MCFG table detected, 1 entries Feb 9 19:14:35.957846 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 9 19:14:35.958152 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:14:35.958382 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 19:14:35.958580 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 19:14:35.958773 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 9 19:14:35.958966 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 9 19:14:35.958993 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 9 19:14:35.959011 kernel: acpiphp: Slot [1] registered Feb 9 19:14:35.959027 kernel: acpiphp: Slot [2] registered Feb 9 19:14:35.959043 kernel: acpiphp: Slot [3] registered Feb 9 19:14:35.959059 kernel: acpiphp: Slot [4] registered Feb 9 19:14:35.959075 kernel: acpiphp: Slot [5] registered Feb 9 19:14:35.959091 kernel: acpiphp: Slot [6] registered Feb 9 19:14:35.959107 kernel: acpiphp: Slot [7] registered Feb 9 19:14:35.959123 kernel: acpiphp: Slot [8] registered Feb 9 19:14:35.959143 kernel: acpiphp: Slot [9] registered Feb 9 19:14:35.959160 kernel: acpiphp: Slot [10] registered Feb 9 19:14:35.959176 kernel: acpiphp: Slot [11] registered Feb 9 19:14:35.959192 kernel: acpiphp: Slot [12] registered Feb 9 19:14:35.959208 kernel: acpiphp: Slot [13] registered Feb 9 19:14:35.959224 kernel: acpiphp: Slot [14] registered Feb 9 19:14:35.959240 kernel: acpiphp: Slot [15] registered Feb 9 19:14:35.959273 kernel: acpiphp: Slot [16] registered Feb 9 19:14:35.959292 kernel: acpiphp: Slot [17] registered Feb 9 19:14:35.959309 kernel: acpiphp: Slot [18] registered Feb 9 19:14:35.959331 kernel: acpiphp: Slot [19] registered Feb 9 19:14:35.959347 kernel: acpiphp: Slot [20] registered Feb 9 19:14:35.959362 kernel: acpiphp: Slot [21] registered Feb 9 19:14:35.959378 kernel: acpiphp: Slot [22] registered Feb 9 19:14:35.959394 kernel: acpiphp: Slot [23] registered Feb 9 19:14:35.959410 kernel: acpiphp: Slot [24] registered Feb 9 19:14:35.959426 kernel: acpiphp: Slot [25] registered Feb 9 19:14:35.959442 kernel: acpiphp: Slot [26] registered Feb 9 19:14:35.959458 kernel: acpiphp: Slot [27] registered Feb 9 19:14:35.959478 kernel: acpiphp: Slot [28] registered Feb 9 19:14:35.959494 kernel: acpiphp: Slot [29] registered Feb 9 19:14:35.959510 kernel: acpiphp: Slot [30] registered Feb 9 19:14:35.959526 kernel: acpiphp: Slot [31] registered Feb 9 19:14:35.959542 kernel: PCI host bridge to bus 0000:00 Feb 9 19:14:35.959741 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 9 19:14:35.959922 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 19:14:35.960100 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 9 19:14:35.963563 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 9 19:14:35.963830 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 9 19:14:35.964052 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 9 19:14:35.964304 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 9 19:14:35.964545 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 19:14:35.964766 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 9 19:14:35.964989 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 19:14:35.965216 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 19:14:35.965458 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 9 19:14:35.965666 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 9 19:14:35.965869 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 9 19:14:35.966072 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 19:14:35.966325 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 9 19:14:35.966542 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 9 19:14:35.966747 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 9 19:14:35.966956 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 9 19:14:35.967163 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 9 19:14:35.967386 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 9 19:14:35.967574 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 19:14:35.967762 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 9 19:14:35.967793 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 19:14:35.967811 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 19:14:35.967828 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 19:14:35.967844 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 19:14:35.967861 kernel: iommu: Default domain type: Translated Feb 9 19:14:35.967877 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 19:14:35.967893 kernel: vgaarb: loaded Feb 9 19:14:35.967910 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:14:35.967927 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:14:35.967948 kernel: PTP clock support registered Feb 9 19:14:35.967964 kernel: Registered efivars operations Feb 9 19:14:35.967980 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 19:14:35.967997 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:14:35.968013 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:14:35.968030 kernel: pnp: PnP ACPI init Feb 9 19:14:35.979569 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 9 19:14:35.979612 kernel: pnp: PnP ACPI: found 1 devices Feb 9 19:14:35.979630 kernel: NET: Registered PF_INET protocol family Feb 9 19:14:35.979655 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:14:35.979674 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 19:14:35.979691 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:14:35.979707 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:14:35.979724 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 19:14:35.979740 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 19:14:35.979757 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:14:35.979773 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:14:35.979790 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:14:35.979811 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:14:35.979827 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 9 19:14:35.979843 kernel: kvm [1]: HYP mode not available Feb 9 19:14:35.979859 kernel: Initialise system trusted keyrings Feb 9 19:14:35.979876 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 19:14:35.979892 kernel: Key type asymmetric registered Feb 9 19:14:35.979908 kernel: Asymmetric key parser 'x509' registered Feb 9 19:14:35.979925 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:14:35.979941 kernel: io scheduler mq-deadline registered Feb 9 19:14:35.979962 kernel: io scheduler kyber registered Feb 9 19:14:35.979978 kernel: io scheduler bfq registered Feb 9 19:14:35.980219 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 9 19:14:35.980244 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 19:14:35.980282 kernel: ACPI: button: Power Button [PWRB] Feb 9 19:14:35.980300 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:14:35.980317 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 9 19:14:35.980528 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 9 19:14:35.980557 kernel: printk: console [ttyS0] disabled Feb 9 19:14:35.980574 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 9 19:14:35.980591 kernel: printk: console [ttyS0] enabled Feb 9 19:14:35.980608 kernel: printk: bootconsole [uart0] disabled Feb 9 19:14:35.980624 kernel: thunder_xcv, ver 1.0 Feb 9 19:14:35.980640 kernel: thunder_bgx, ver 1.0 Feb 9 19:14:35.980656 kernel: nicpf, ver 1.0 Feb 9 19:14:35.980672 kernel: nicvf, ver 1.0 Feb 9 19:14:35.980885 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 19:14:35.981081 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T19:14:35 UTC (1707506075) Feb 9 19:14:35.981104 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:14:35.981121 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:14:35.981138 kernel: Segment Routing with IPv6 Feb 9 19:14:35.981154 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:14:35.981170 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:14:35.981187 kernel: Key type dns_resolver registered Feb 9 19:14:35.981203 kernel: registered taskstats version 1 Feb 9 19:14:35.981224 kernel: Loading compiled-in X.509 certificates Feb 9 19:14:35.981241 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 19:14:35.981275 kernel: Key type .fscrypt registered Feb 9 19:14:35.981293 kernel: Key type fscrypt-provisioning registered Feb 9 19:14:35.981310 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:14:35.981326 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:14:35.981342 kernel: ima: No architecture policies found Feb 9 19:14:35.981358 kernel: Freeing unused kernel memory: 34688K Feb 9 19:14:35.981374 kernel: Run /init as init process Feb 9 19:14:35.981395 kernel: with arguments: Feb 9 19:14:35.981412 kernel: /init Feb 9 19:14:35.981428 kernel: with environment: Feb 9 19:14:35.981444 kernel: HOME=/ Feb 9 19:14:35.981460 kernel: TERM=linux Feb 9 19:14:35.981476 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:14:35.981497 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:14:35.981519 systemd[1]: Detected virtualization amazon. Feb 9 19:14:35.981541 systemd[1]: Detected architecture arm64. Feb 9 19:14:35.981559 systemd[1]: Running in initrd. Feb 9 19:14:35.981576 systemd[1]: No hostname configured, using default hostname. Feb 9 19:14:35.981594 systemd[1]: Hostname set to . Feb 9 19:14:35.981612 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:14:35.981629 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:14:35.981647 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:14:35.981664 systemd[1]: Reached target cryptsetup.target. Feb 9 19:14:35.981686 systemd[1]: Reached target paths.target. Feb 9 19:14:35.981703 systemd[1]: Reached target slices.target. Feb 9 19:14:35.981720 systemd[1]: Reached target swap.target. Feb 9 19:14:35.981738 systemd[1]: Reached target timers.target. Feb 9 19:14:35.981756 systemd[1]: Listening on iscsid.socket. Feb 9 19:14:35.981773 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:14:35.981791 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:14:35.981808 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:14:35.981830 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:14:35.981848 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:14:35.981865 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:14:35.981883 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:14:35.981900 systemd[1]: Reached target sockets.target. Feb 9 19:14:35.981918 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:14:35.981935 systemd[1]: Finished network-cleanup.service. Feb 9 19:14:35.981952 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:14:35.981970 systemd[1]: Starting systemd-journald.service... Feb 9 19:14:35.981992 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:14:35.982009 systemd[1]: Starting systemd-resolved.service... Feb 9 19:14:35.982027 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:14:35.982044 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:14:35.982062 kernel: audit: type=1130 audit(1707506075.971:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:35.982080 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:14:35.982119 systemd-journald[308]: Journal started Feb 9 19:14:35.982210 systemd-journald[308]: Runtime Journal (/run/log/journal/ec224de6ae103bedeaa80411cb97a228) is 8.0M, max 75.4M, 67.4M free. Feb 9 19:14:35.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:35.960314 systemd-modules-load[309]: Inserted module 'overlay' Feb 9 19:14:35.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.014274 kernel: audit: type=1130 audit(1707506075.999:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.014324 systemd[1]: Started systemd-journald.service. Feb 9 19:14:36.014352 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:14:36.020633 systemd-modules-load[309]: Inserted module 'br_netfilter' Feb 9 19:14:36.024536 kernel: Bridge firewalling registered Feb 9 19:14:36.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.032273 kernel: audit: type=1130 audit(1707506076.023:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.032312 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:14:36.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.054559 kernel: audit: type=1130 audit(1707506076.039:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.059279 kernel: SCSI subsystem initialized Feb 9 19:14:36.059570 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:14:36.067892 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:14:36.088904 systemd-resolved[310]: Positive Trust Anchors: Feb 9 19:14:36.088930 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:14:36.088984 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:14:36.134833 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:14:36.134900 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:14:36.132551 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:14:36.143273 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:14:36.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.155015 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:14:36.168535 kernel: audit: type=1130 audit(1707506076.143:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.168581 kernel: audit: type=1130 audit(1707506076.157:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.158984 systemd-modules-load[309]: Inserted module 'dm_multipath' Feb 9 19:14:36.183020 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:14:36.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.184931 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:14:36.198027 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:14:36.201876 kernel: audit: type=1130 audit(1707506076.185:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.212607 dracut-cmdline[328]: dracut-dracut-053 Feb 9 19:14:36.218450 dracut-cmdline[328]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 19:14:36.239833 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:14:36.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.251290 kernel: audit: type=1130 audit(1707506076.240:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.334285 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:14:36.347289 kernel: iscsi: registered transport (tcp) Feb 9 19:14:36.371720 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:14:36.371791 kernel: QLogic iSCSI HBA Driver Feb 9 19:14:36.585898 systemd-resolved[310]: Defaulting to hostname 'linux'. Feb 9 19:14:36.588313 kernel: random: crng init done Feb 9 19:14:36.589866 systemd[1]: Started systemd-resolved.service. Feb 9 19:14:36.601874 kernel: audit: type=1130 audit(1707506076.590:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.591722 systemd[1]: Reached target nss-lookup.target. Feb 9 19:14:36.619659 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:14:36.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:36.623126 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:14:36.688289 kernel: raid6: neonx8 gen() 6364 MB/s Feb 9 19:14:36.706282 kernel: raid6: neonx8 xor() 4745 MB/s Feb 9 19:14:36.724282 kernel: raid6: neonx4 gen() 6455 MB/s Feb 9 19:14:36.742281 kernel: raid6: neonx4 xor() 4904 MB/s Feb 9 19:14:36.760282 kernel: raid6: neonx2 gen() 5707 MB/s Feb 9 19:14:36.778280 kernel: raid6: neonx2 xor() 4510 MB/s Feb 9 19:14:36.796282 kernel: raid6: neonx1 gen() 4456 MB/s Feb 9 19:14:36.814280 kernel: raid6: neonx1 xor() 3685 MB/s Feb 9 19:14:36.832281 kernel: raid6: int64x8 gen() 3413 MB/s Feb 9 19:14:36.850280 kernel: raid6: int64x8 xor() 2099 MB/s Feb 9 19:14:36.868282 kernel: raid6: int64x4 gen() 3780 MB/s Feb 9 19:14:36.886281 kernel: raid6: int64x4 xor() 2202 MB/s Feb 9 19:14:36.904281 kernel: raid6: int64x2 gen() 3565 MB/s Feb 9 19:14:36.922280 kernel: raid6: int64x2 xor() 1955 MB/s Feb 9 19:14:36.940281 kernel: raid6: int64x1 gen() 2772 MB/s Feb 9 19:14:36.959737 kernel: raid6: int64x1 xor() 1456 MB/s Feb 9 19:14:36.959766 kernel: raid6: using algorithm neonx4 gen() 6455 MB/s Feb 9 19:14:36.959790 kernel: raid6: .... xor() 4904 MB/s, rmw enabled Feb 9 19:14:36.961521 kernel: raid6: using neon recovery algorithm Feb 9 19:14:36.980295 kernel: xor: measuring software checksum speed Feb 9 19:14:36.982280 kernel: 8regs : 9332 MB/sec Feb 9 19:14:36.985281 kernel: 32regs : 11107 MB/sec Feb 9 19:14:36.989035 kernel: arm64_neon : 9477 MB/sec Feb 9 19:14:36.989066 kernel: xor: using function: 32regs (11107 MB/sec) Feb 9 19:14:37.078304 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 19:14:37.095676 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:14:37.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:37.097000 audit: BPF prog-id=7 op=LOAD Feb 9 19:14:37.097000 audit: BPF prog-id=8 op=LOAD Feb 9 19:14:37.099126 systemd[1]: Starting systemd-udevd.service... Feb 9 19:14:37.125102 systemd-udevd[508]: Using default interface naming scheme 'v252'. Feb 9 19:14:37.135213 systemd[1]: Started systemd-udevd.service. Feb 9 19:14:37.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:37.143763 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:14:37.171072 dracut-pre-trigger[522]: rd.md=0: removing MD RAID activation Feb 9 19:14:37.231389 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:14:37.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:37.235976 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:14:37.337799 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:14:37.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:37.450412 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 19:14:37.450477 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 9 19:14:37.459759 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 19:14:37.460042 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 19:14:37.468279 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:d7:ce:6f:20:3f Feb 9 19:14:37.474420 (udev-worker)[566]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:14:37.485282 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 9 19:14:37.487940 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 19:14:37.496289 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 19:14:37.502219 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:14:37.502276 kernel: GPT:9289727 != 16777215 Feb 9 19:14:37.502303 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:14:37.505664 kernel: GPT:9289727 != 16777215 Feb 9 19:14:37.505694 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:14:37.509033 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:14:37.579299 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (556) Feb 9 19:14:37.605111 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:14:37.652327 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:14:37.689023 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:14:37.691485 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:14:37.715220 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:14:37.728457 systemd[1]: Starting disk-uuid.service... Feb 9 19:14:37.738716 disk-uuid[670]: Primary Header is updated. Feb 9 19:14:37.738716 disk-uuid[670]: Secondary Entries is updated. Feb 9 19:14:37.738716 disk-uuid[670]: Secondary Header is updated. Feb 9 19:14:37.749287 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:14:37.758291 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:14:37.766287 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:14:38.763284 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:14:38.765176 disk-uuid[671]: The operation has completed successfully. Feb 9 19:14:38.922845 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:14:38.925082 systemd[1]: Finished disk-uuid.service. Feb 9 19:14:38.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:38.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:38.947883 systemd[1]: Starting verity-setup.service... Feb 9 19:14:38.980289 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 19:14:39.062557 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:14:39.080138 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:14:39.086226 systemd[1]: Finished verity-setup.service. Feb 9 19:14:39.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.166322 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:14:39.167030 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:14:39.169971 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:14:39.173763 systemd[1]: Starting ignition-setup.service... Feb 9 19:14:39.181602 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:14:39.200521 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:14:39.200589 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:14:39.200622 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:14:39.210306 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:14:39.227797 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:14:39.263761 systemd[1]: Finished ignition-setup.service. Feb 9 19:14:39.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.268496 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:14:39.326014 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:14:39.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.327000 audit: BPF prog-id=9 op=LOAD Feb 9 19:14:39.330430 systemd[1]: Starting systemd-networkd.service... Feb 9 19:14:39.375942 systemd-networkd[1183]: lo: Link UP Feb 9 19:14:39.375964 systemd-networkd[1183]: lo: Gained carrier Feb 9 19:14:39.379331 systemd-networkd[1183]: Enumeration completed Feb 9 19:14:39.381039 systemd-networkd[1183]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:14:39.381075 systemd[1]: Started systemd-networkd.service. Feb 9 19:14:39.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.387815 systemd[1]: Reached target network.target. Feb 9 19:14:39.391122 systemd-networkd[1183]: eth0: Link UP Feb 9 19:14:39.391307 systemd-networkd[1183]: eth0: Gained carrier Feb 9 19:14:39.397795 systemd[1]: Starting iscsiuio.service... Feb 9 19:14:39.408372 systemd[1]: Started iscsiuio.service. Feb 9 19:14:39.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.409881 systemd-networkd[1183]: eth0: DHCPv4 address 172.31.23.196/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:14:39.415603 systemd[1]: Starting iscsid.service... Feb 9 19:14:39.424355 iscsid[1188]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:14:39.424355 iscsid[1188]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:14:39.424355 iscsid[1188]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:14:39.424355 iscsid[1188]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:14:39.424355 iscsid[1188]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:14:39.444303 iscsid[1188]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:14:39.437643 systemd[1]: Started iscsid.service. Feb 9 19:14:39.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.451157 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:14:39.471516 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:14:39.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.473376 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:14:39.475027 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:14:39.477237 systemd[1]: Reached target remote-fs.target. Feb 9 19:14:39.481036 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:14:39.497836 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:14:39.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.827833 ignition[1133]: Ignition 2.14.0 Feb 9 19:14:39.827874 ignition[1133]: Stage: fetch-offline Feb 9 19:14:39.828155 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:39.828216 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:39.848386 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:39.851022 ignition[1133]: Ignition finished successfully Feb 9 19:14:39.854047 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:14:39.867816 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 19:14:39.867883 kernel: audit: type=1130 audit(1707506079.856:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.858796 systemd[1]: Starting ignition-fetch.service... Feb 9 19:14:39.877937 ignition[1207]: Ignition 2.14.0 Feb 9 19:14:39.877966 ignition[1207]: Stage: fetch Feb 9 19:14:39.878336 ignition[1207]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:39.878396 ignition[1207]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:39.893246 ignition[1207]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:39.895563 ignition[1207]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:39.904126 ignition[1207]: INFO : PUT result: OK Feb 9 19:14:39.907103 ignition[1207]: DEBUG : parsed url from cmdline: "" Feb 9 19:14:39.907103 ignition[1207]: INFO : no config URL provided Feb 9 19:14:39.907103 ignition[1207]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:14:39.907103 ignition[1207]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 19:14:39.907103 ignition[1207]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:39.924603 ignition[1207]: INFO : PUT result: OK Feb 9 19:14:39.924603 ignition[1207]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 19:14:39.924603 ignition[1207]: INFO : GET result: OK Feb 9 19:14:39.924603 ignition[1207]: DEBUG : parsing config with SHA512: 591c3bc83b89ccd60e11ffe70382dc950e78ceb95b03267add4784a04e4406334cca65757f0b86b980bb5fb114e7fb475426582c4238a996f3513b5dcf223c02 Feb 9 19:14:39.986469 unknown[1207]: fetched base config from "system" Feb 9 19:14:39.986719 unknown[1207]: fetched base config from "system" Feb 9 19:14:39.988697 ignition[1207]: fetch: fetch complete Feb 9 19:14:39.986738 unknown[1207]: fetched user config from "aws" Feb 9 19:14:39.988711 ignition[1207]: fetch: fetch passed Feb 9 19:14:39.988819 ignition[1207]: Ignition finished successfully Feb 9 19:14:39.998632 systemd[1]: Finished ignition-fetch.service. Feb 9 19:14:40.008677 kernel: audit: type=1130 audit(1707506079.999:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:39.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.009986 systemd[1]: Starting ignition-kargs.service... Feb 9 19:14:40.026656 ignition[1213]: Ignition 2.14.0 Feb 9 19:14:40.026681 ignition[1213]: Stage: kargs Feb 9 19:14:40.026976 ignition[1213]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:40.027034 ignition[1213]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:40.040645 ignition[1213]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:40.043082 ignition[1213]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:40.046035 ignition[1213]: INFO : PUT result: OK Feb 9 19:14:40.051379 ignition[1213]: kargs: kargs passed Feb 9 19:14:40.052890 ignition[1213]: Ignition finished successfully Feb 9 19:14:40.056134 systemd[1]: Finished ignition-kargs.service. Feb 9 19:14:40.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.060520 systemd[1]: Starting ignition-disks.service... Feb 9 19:14:40.070306 kernel: audit: type=1130 audit(1707506080.058:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.077617 ignition[1219]: Ignition 2.14.0 Feb 9 19:14:40.077650 ignition[1219]: Stage: disks Feb 9 19:14:40.077983 ignition[1219]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:40.078041 ignition[1219]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:40.091618 ignition[1219]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:40.093919 ignition[1219]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:40.096341 ignition[1219]: INFO : PUT result: OK Feb 9 19:14:40.101783 ignition[1219]: disks: disks passed Feb 9 19:14:40.102053 ignition[1219]: Ignition finished successfully Feb 9 19:14:40.106461 systemd[1]: Finished ignition-disks.service. Feb 9 19:14:40.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.109607 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:14:40.139831 kernel: audit: type=1130 audit(1707506080.108:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.118205 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:14:40.119945 systemd[1]: Reached target local-fs.target. Feb 9 19:14:40.121458 systemd[1]: Reached target sysinit.target. Feb 9 19:14:40.122993 systemd[1]: Reached target basic.target. Feb 9 19:14:40.125889 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:14:40.160517 systemd-fsck[1227]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 19:14:40.171495 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:14:40.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.182473 systemd[1]: Mounting sysroot.mount... Feb 9 19:14:40.189381 kernel: audit: type=1130 audit(1707506080.170:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.212295 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:14:40.213490 systemd[1]: Mounted sysroot.mount. Feb 9 19:14:40.213889 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:14:40.225682 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:14:40.229231 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:14:40.229444 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:14:40.229504 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:14:40.244660 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:14:40.251128 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:14:40.255992 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:14:40.267900 initrd-setup-root[1249]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:14:40.279921 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1244) Feb 9 19:14:40.279984 initrd-setup-root[1257]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:14:40.289531 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:14:40.289597 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:14:40.292318 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:14:40.295348 initrd-setup-root[1281]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:14:40.303290 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:14:40.307877 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:14:40.310979 initrd-setup-root[1291]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:14:40.476969 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:14:40.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.481612 systemd[1]: Starting ignition-mount.service... Feb 9 19:14:40.490861 kernel: audit: type=1130 audit(1707506080.479:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.494372 systemd[1]: Starting sysroot-boot.service... Feb 9 19:14:40.501985 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:14:40.505629 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:14:40.532798 ignition[1310]: INFO : Ignition 2.14.0 Feb 9 19:14:40.534681 ignition[1310]: INFO : Stage: mount Feb 9 19:14:40.536125 ignition[1310]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:40.536125 ignition[1310]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:40.552061 systemd[1]: Finished sysroot-boot.service. Feb 9 19:14:40.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.565288 kernel: audit: type=1130 audit(1707506080.553:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.565852 ignition[1310]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:40.568832 ignition[1310]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:40.571208 ignition[1310]: INFO : PUT result: OK Feb 9 19:14:40.576587 ignition[1310]: INFO : mount: mount passed Feb 9 19:14:40.578242 ignition[1310]: INFO : Ignition finished successfully Feb 9 19:14:40.580425 systemd[1]: Finished ignition-mount.service. Feb 9 19:14:40.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.591747 systemd[1]: Starting ignition-files.service... Feb 9 19:14:40.606306 kernel: audit: type=1130 audit(1707506080.581:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:40.607413 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:14:40.625296 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1319) Feb 9 19:14:40.631490 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:14:40.631536 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:14:40.631560 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:14:40.640287 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:14:40.644588 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:14:40.662721 ignition[1338]: INFO : Ignition 2.14.0 Feb 9 19:14:40.666325 ignition[1338]: INFO : Stage: files Feb 9 19:14:40.666325 ignition[1338]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:40.666325 ignition[1338]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:40.687946 ignition[1338]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:40.691598 ignition[1338]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:40.694082 ignition[1338]: INFO : PUT result: OK Feb 9 19:14:40.699379 ignition[1338]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:14:40.703405 ignition[1338]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:14:40.703405 ignition[1338]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:14:40.730181 ignition[1338]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:14:40.733013 ignition[1338]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:14:40.736670 unknown[1338]: wrote ssh authorized keys file for user: core Feb 9 19:14:40.738872 ignition[1338]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:14:40.742499 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 19:14:40.746356 ignition[1338]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 19:14:41.213411 systemd-networkd[1183]: eth0: Gained IPv6LL Feb 9 19:14:41.222025 ignition[1338]: INFO : GET result: OK Feb 9 19:14:41.668893 ignition[1338]: DEBUG : file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 19:14:41.673858 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 19:14:41.673858 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 19:14:41.673858 ignition[1338]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 19:14:41.722376 ignition[1338]: INFO : GET result: OK Feb 9 19:14:41.852704 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 19:14:41.857023 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 19:14:41.857023 ignition[1338]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 19:14:42.232855 ignition[1338]: INFO : GET result: OK Feb 9 19:14:42.472489 ignition[1338]: DEBUG : file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 19:14:42.477002 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 19:14:42.477002 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:14:42.477002 ignition[1338]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 19:14:42.591279 ignition[1338]: INFO : GET result: OK Feb 9 19:14:43.225549 ignition[1338]: DEBUG : file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 19:14:43.230502 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:14:43.230502 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:14:43.230502 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:14:43.249567 ignition[1338]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3896920425" Feb 9 19:14:43.249567 ignition[1338]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3896920425": device or resource busy Feb 9 19:14:43.249567 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3896920425", trying btrfs: device or resource busy Feb 9 19:14:43.249567 ignition[1338]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3896920425" Feb 9 19:14:43.265379 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1343) Feb 9 19:14:43.272124 ignition[1338]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3896920425" Feb 9 19:14:43.284979 ignition[1338]: INFO : op(3): [started] unmounting "/mnt/oem3896920425" Feb 9 19:14:43.287353 ignition[1338]: INFO : op(3): [finished] unmounting "/mnt/oem3896920425" Feb 9 19:14:43.287353 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:14:43.287353 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:14:43.287353 ignition[1338]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 19:14:43.300128 systemd[1]: mnt-oem3896920425.mount: Deactivated successfully. Feb 9 19:14:43.346667 ignition[1338]: INFO : GET result: OK Feb 9 19:14:43.941493 ignition[1338]: DEBUG : file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 19:14:43.946045 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:14:43.949361 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:14:43.952635 ignition[1338]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 19:14:44.014733 ignition[1338]: INFO : GET result: OK Feb 9 19:14:45.440653 ignition[1338]: DEBUG : file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:14:45.447244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:14:45.447244 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:14:45.506524 ignition[1338]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3482386892" Feb 9 19:14:45.506524 ignition[1338]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3482386892": device or resource busy Feb 9 19:14:45.506524 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3482386892", trying btrfs: device or resource busy Feb 9 19:14:45.506524 ignition[1338]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3482386892" Feb 9 19:14:45.518689 ignition[1338]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3482386892" Feb 9 19:14:45.518689 ignition[1338]: INFO : op(6): [started] unmounting "/mnt/oem3482386892" Feb 9 19:14:45.523418 ignition[1338]: INFO : op(6): [finished] unmounting "/mnt/oem3482386892" Feb 9 19:14:45.523418 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:14:45.523418 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:14:45.523418 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:14:45.549986 ignition[1338]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem895982387" Feb 9 19:14:45.549986 ignition[1338]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem895982387": device or resource busy Feb 9 19:14:45.549986 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem895982387", trying btrfs: device or resource busy Feb 9 19:14:45.549986 ignition[1338]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem895982387" Feb 9 19:14:45.549986 ignition[1338]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem895982387" Feb 9 19:14:45.549986 ignition[1338]: INFO : op(9): [started] unmounting "/mnt/oem895982387" Feb 9 19:14:45.566860 ignition[1338]: INFO : op(9): [finished] unmounting "/mnt/oem895982387" Feb 9 19:14:45.566860 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:14:45.566860 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:14:45.566860 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:14:45.591191 ignition[1338]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2169825081" Feb 9 19:14:45.591191 ignition[1338]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2169825081": device or resource busy Feb 9 19:14:45.591191 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2169825081", trying btrfs: device or resource busy Feb 9 19:14:45.591191 ignition[1338]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2169825081" Feb 9 19:14:45.591191 ignition[1338]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2169825081" Feb 9 19:14:45.607800 ignition[1338]: INFO : op(c): [started] unmounting "/mnt/oem2169825081" Feb 9 19:14:45.607800 ignition[1338]: INFO : op(c): [finished] unmounting "/mnt/oem2169825081" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(13): [started] processing unit "amazon-ssm-agent.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(13): op(14): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(13): op(14): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(13): [finished] processing unit "amazon-ssm-agent.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(15): [started] processing unit "nvidia.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(15): [finished] processing unit "nvidia.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(16): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(16): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 9 19:14:45.607800 ignition[1338]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1d): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1d): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1e): [started] setting preset to enabled for "nvidia.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1e): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:14:45.665626 ignition[1338]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:14:45.715315 ignition[1338]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:14:45.718630 ignition[1338]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:14:45.718630 ignition[1338]: INFO : files: files passed Feb 9 19:14:45.718630 ignition[1338]: INFO : Ignition finished successfully Feb 9 19:14:45.725446 systemd[1]: Finished ignition-files.service. Feb 9 19:14:45.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.739275 kernel: audit: type=1130 audit(1707506085.728:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.742639 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:14:45.746788 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:14:45.749105 systemd[1]: Starting ignition-quench.service... Feb 9 19:14:45.757754 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:14:45.758100 systemd[1]: Finished ignition-quench.service. Feb 9 19:14:45.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.780753 kernel: audit: type=1130 audit(1707506085.761:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.780821 kernel: audit: type=1131 audit(1707506085.761:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.782835 initrd-setup-root-after-ignition[1363]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:14:45.787068 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:14:45.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.791037 systemd[1]: Reached target ignition-complete.target. Feb 9 19:14:45.805213 kernel: audit: type=1130 audit(1707506085.789:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.801567 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:14:45.834217 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:14:45.836309 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:14:45.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.851987 systemd[1]: Reached target initrd-fs.target. Feb 9 19:14:45.867233 kernel: audit: type=1130 audit(1707506085.850:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.867294 kernel: audit: type=1131 audit(1707506085.850:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.868920 systemd[1]: Reached target initrd.target. Feb 9 19:14:45.871868 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:14:45.875784 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:14:45.898911 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:14:45.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.909441 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:14:45.914311 kernel: audit: type=1130 audit(1707506085.901:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.929135 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:14:45.932515 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:14:45.936089 systemd[1]: Stopped target timers.target. Feb 9 19:14:45.939153 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:14:45.941246 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:14:45.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.951746 systemd[1]: Stopped target initrd.target. Feb 9 19:14:45.954554 kernel: audit: type=1131 audit(1707506085.943:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.952031 systemd[1]: Stopped target basic.target. Feb 9 19:14:45.956118 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:14:45.957971 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:14:45.959815 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:14:45.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.001695 kernel: audit: type=1131 audit(1707506085.976:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.001729 kernel: audit: type=1131 audit(1707506085.976:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.963071 systemd[1]: Stopped target remote-fs.target. Feb 9 19:14:45.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:45.966411 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:14:45.968234 systemd[1]: Stopped target sysinit.target. Feb 9 19:14:45.969950 systemd[1]: Stopped target local-fs.target. Feb 9 19:14:45.973212 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:14:45.974976 systemd[1]: Stopped target swap.target. Feb 9 19:14:45.976491 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:14:45.976704 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:14:45.978568 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:14:45.980270 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:14:45.980466 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:14:45.982389 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:14:45.982597 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:14:45.984739 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:14:46.077386 ignition[1376]: INFO : Ignition 2.14.0 Feb 9 19:14:46.077386 ignition[1376]: INFO : Stage: umount Feb 9 19:14:46.077386 ignition[1376]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:14:46.077386 ignition[1376]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:14:46.077386 ignition[1376]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:14:45.984926 systemd[1]: Stopped ignition-files.service. Feb 9 19:14:46.099805 ignition[1376]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:14:46.099805 ignition[1376]: INFO : PUT result: OK Feb 9 19:14:46.099805 ignition[1376]: INFO : umount: umount passed Feb 9 19:14:46.099805 ignition[1376]: INFO : Ignition finished successfully Feb 9 19:14:46.003383 systemd[1]: Stopping ignition-mount.service... Feb 9 19:14:46.009036 systemd[1]: Stopping iscsiuio.service... Feb 9 19:14:46.014469 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:14:46.097822 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:14:46.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.098139 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:14:46.100450 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:14:46.100649 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:14:46.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.121731 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:14:46.123019 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:14:46.123222 systemd[1]: Stopped iscsiuio.service. Feb 9 19:14:46.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.127339 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:14:46.127526 systemd[1]: Stopped ignition-mount.service. Feb 9 19:14:46.130477 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:14:46.130655 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:14:46.133569 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:14:46.133745 systemd[1]: Stopped ignition-disks.service. Feb 9 19:14:46.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.146659 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:14:46.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.146756 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:14:46.152018 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:14:46.152097 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:14:46.159594 systemd[1]: Stopped target network.target. Feb 9 19:14:46.175485 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:14:46.175575 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:14:46.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.180834 systemd[1]: Stopped target paths.target. Feb 9 19:14:46.180945 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:14:46.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.188319 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:14:46.203747 systemd[1]: Stopped target slices.target. Feb 9 19:14:46.205246 systemd[1]: Stopped target sockets.target. Feb 9 19:14:46.222283 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:14:46.222367 systemd[1]: Closed iscsid.socket. Feb 9 19:14:46.226340 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:14:46.226433 systemd[1]: Closed iscsiuio.socket. Feb 9 19:14:46.229337 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:14:46.232490 systemd[1]: Stopped ignition-setup.service. Feb 9 19:14:46.235437 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:14:46.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.235530 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:14:46.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.240518 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:14:46.243597 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:14:46.248687 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:14:46.250736 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:14:46.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.254318 systemd-networkd[1183]: eth0: DHCPv6 lease lost Feb 9 19:14:46.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.262000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:14:46.254596 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:14:46.254781 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:14:46.267000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:14:46.260543 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:14:46.260735 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:14:46.264204 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:14:46.264318 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:14:46.267814 systemd[1]: Stopping network-cleanup.service... Feb 9 19:14:46.280560 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:14:46.282536 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:14:46.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.286061 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:14:46.286167 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:14:46.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.290958 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:14:46.291055 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:14:46.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.296625 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:14:46.302588 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:14:46.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.303647 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:14:46.303932 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:14:46.318707 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:14:46.318805 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:14:46.330235 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:14:46.330344 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:14:46.337826 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:14:46.337945 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:14:46.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.344341 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:14:46.344429 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:14:46.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.348904 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:14:46.348984 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:14:46.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.355474 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:14:46.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.375377 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:14:46.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.375505 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:14:46.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:46.381426 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:14:46.381691 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:14:46.385020 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:14:46.385100 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:14:46.387590 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:14:46.387789 systemd[1]: Stopped network-cleanup.service. Feb 9 19:14:46.390981 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:14:46.391172 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:14:46.393321 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:14:46.397220 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:14:46.414976 systemd[1]: Switching root. Feb 9 19:14:46.444487 iscsid[1188]: iscsid shutting down. Feb 9 19:14:46.446212 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Feb 9 19:14:46.446316 systemd-journald[308]: Journal stopped Feb 9 19:14:51.690369 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:14:51.690486 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:14:51.690521 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:14:51.690554 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:14:51.690589 kernel: SELinux: policy capability open_perms=1 Feb 9 19:14:51.690620 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:14:51.690654 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:14:51.690685 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:14:51.690715 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:14:51.690746 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:14:51.690777 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:14:51.690810 systemd[1]: Successfully loaded SELinux policy in 115.973ms. Feb 9 19:14:51.690870 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.264ms. Feb 9 19:14:51.690906 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:14:51.690937 systemd[1]: Detected virtualization amazon. Feb 9 19:14:51.690971 systemd[1]: Detected architecture arm64. Feb 9 19:14:51.691003 systemd[1]: Detected first boot. Feb 9 19:14:51.693385 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:14:51.693430 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:14:51.693465 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:14:51.693500 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:14:51.693535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:14:51.693578 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:14:51.693617 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 9 19:14:51.693647 kernel: audit: type=1334 audit(1707506091.308:88): prog-id=12 op=LOAD Feb 9 19:14:51.693677 kernel: audit: type=1334 audit(1707506091.308:89): prog-id=3 op=UNLOAD Feb 9 19:14:51.693706 kernel: audit: type=1334 audit(1707506091.308:90): prog-id=13 op=LOAD Feb 9 19:14:51.693734 kernel: audit: type=1334 audit(1707506091.308:91): prog-id=14 op=LOAD Feb 9 19:14:51.693765 kernel: audit: type=1334 audit(1707506091.308:92): prog-id=4 op=UNLOAD Feb 9 19:14:51.693797 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:14:51.693830 kernel: audit: type=1334 audit(1707506091.308:93): prog-id=5 op=UNLOAD Feb 9 19:14:51.693858 systemd[1]: Stopped iscsid.service. Feb 9 19:14:51.693887 kernel: audit: type=1334 audit(1707506091.314:94): prog-id=15 op=LOAD Feb 9 19:14:51.693918 kernel: audit: type=1334 audit(1707506091.314:95): prog-id=12 op=UNLOAD Feb 9 19:14:51.693947 kernel: audit: type=1334 audit(1707506091.317:96): prog-id=16 op=LOAD Feb 9 19:14:51.693976 kernel: audit: type=1334 audit(1707506091.319:97): prog-id=17 op=LOAD Feb 9 19:14:51.694006 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:14:51.694056 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:14:51.694093 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:14:51.694131 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:14:51.694163 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:14:51.694194 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:14:51.694224 systemd[1]: Created slice system-getty.slice. Feb 9 19:14:51.694272 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:14:51.694309 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:14:51.694341 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:14:51.694377 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:14:51.694407 systemd[1]: Created slice user.slice. Feb 9 19:14:51.694437 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:14:51.694467 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:14:51.694497 systemd[1]: Set up automount boot.automount. Feb 9 19:14:51.694528 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:14:51.694557 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:14:51.694588 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:14:51.694620 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:14:51.694654 systemd[1]: Reached target integritysetup.target. Feb 9 19:14:51.694692 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:14:51.696739 systemd[1]: Reached target remote-fs.target. Feb 9 19:14:51.696794 systemd[1]: Reached target slices.target. Feb 9 19:14:51.696827 systemd[1]: Reached target swap.target. Feb 9 19:14:51.696858 systemd[1]: Reached target torcx.target. Feb 9 19:14:51.696941 systemd[1]: Reached target veritysetup.target. Feb 9 19:14:51.696979 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:14:51.697010 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:14:51.697039 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:14:51.697078 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:14:51.697109 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:14:51.697139 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:14:51.697169 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:14:51.697199 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:14:51.697229 systemd[1]: Mounting media.mount... Feb 9 19:14:51.697298 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:14:51.697335 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:14:51.697365 systemd[1]: Mounting tmp.mount... Feb 9 19:14:51.697400 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:14:51.697434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:14:51.697464 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:14:51.697501 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:14:51.697533 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:14:51.697564 systemd[1]: Starting modprobe@drm.service... Feb 9 19:14:51.697596 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:14:51.697626 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:14:51.697657 systemd[1]: Starting modprobe@loop.service... Feb 9 19:14:51.697692 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:14:51.697722 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:14:51.697751 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:14:51.697783 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:14:51.697821 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:14:51.697859 systemd[1]: Stopped systemd-journald.service. Feb 9 19:14:51.697892 systemd[1]: Starting systemd-journald.service... Feb 9 19:14:51.697923 kernel: fuse: init (API version 7.34) Feb 9 19:14:51.697953 kernel: loop: module loaded Feb 9 19:14:51.697985 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:14:51.698017 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:14:51.698065 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:14:51.698098 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:14:51.698129 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:14:51.698159 systemd[1]: Stopped verity-setup.service. Feb 9 19:14:51.698192 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:14:51.698224 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:14:51.700383 systemd[1]: Mounted media.mount. Feb 9 19:14:51.700442 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:14:51.700643 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:14:51.700683 systemd[1]: Mounted tmp.mount. Feb 9 19:14:51.700727 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:14:51.700762 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:14:51.700795 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:14:51.700827 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:14:51.700857 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:14:51.700891 systemd-journald[1488]: Journal started Feb 9 19:14:51.700989 systemd-journald[1488]: Runtime Journal (/run/log/journal/ec224de6ae103bedeaa80411cb97a228) is 8.0M, max 75.4M, 67.4M free. Feb 9 19:14:47.159000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:14:47.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:14:47.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:14:47.327000 audit: BPF prog-id=10 op=LOAD Feb 9 19:14:47.327000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:14:47.327000 audit: BPF prog-id=11 op=LOAD Feb 9 19:14:47.327000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:14:47.533000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:14:47.533000 audit[1410]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022104 a1=4000028060 a2=4000026040 a3=32 items=0 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:14:47.533000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:14:47.537000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:14:47.537000 audit[1410]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000221e9 a2=1ed a3=0 items=2 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:14:47.537000 audit: CWD cwd="/" Feb 9 19:14:47.537000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:14:47.537000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:14:47.537000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:14:51.308000 audit: BPF prog-id=12 op=LOAD Feb 9 19:14:51.308000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:14:51.308000 audit: BPF prog-id=13 op=LOAD Feb 9 19:14:51.308000 audit: BPF prog-id=14 op=LOAD Feb 9 19:14:51.308000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:14:51.308000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:14:51.314000 audit: BPF prog-id=15 op=LOAD Feb 9 19:14:51.314000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:14:51.317000 audit: BPF prog-id=16 op=LOAD Feb 9 19:14:51.319000 audit: BPF prog-id=17 op=LOAD Feb 9 19:14:51.319000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:14:51.319000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:14:51.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.707933 systemd[1]: Started systemd-journald.service. Feb 9 19:14:51.333000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:14:51.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.597000 audit: BPF prog-id=18 op=LOAD Feb 9 19:14:51.598000 audit: BPF prog-id=19 op=LOAD Feb 9 19:14:51.598000 audit: BPF prog-id=20 op=LOAD Feb 9 19:14:51.598000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:14:51.598000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:14:51.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.686000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:14:51.686000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffccb3f400 a2=4000 a3=1 items=0 ppid=1 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:14:51.686000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:14:51.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:47.513659 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:14:51.307081 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:14:47.523386 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:14:51.323067 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:14:47.523437 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:14:51.710609 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:14:51.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:47.523504 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:14:51.710890 systemd[1]: Finished modprobe@drm.service. Feb 9 19:14:47.523530 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:14:51.716058 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:14:47.523597 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:14:51.716529 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:14:47.523629 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:14:51.718985 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:14:47.524025 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:14:51.719275 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:14:47.524102 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:14:47.524138 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:14:51.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:47.533786 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:14:51.722684 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:14:47.533872 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:14:51.722985 systemd[1]: Finished modprobe@loop.service. Feb 9 19:14:47.533920 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:14:51.725992 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:14:47.533961 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:14:47.534006 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:14:47.534060 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:14:50.496828 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:14:50.497390 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:14:50.497630 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:14:50.498093 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:14:50.498197 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:14:50.498354 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:14:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:14:51.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.739413 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:14:51.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.742342 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:14:51.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.745592 systemd[1]: Reached target network-pre.target. Feb 9 19:14:51.750133 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:14:51.754771 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:14:51.762570 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:14:51.765670 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:14:51.769434 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:14:51.771189 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:14:51.773451 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:14:51.775160 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:14:51.777765 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:14:51.783382 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:14:51.785658 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:14:51.808361 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:14:51.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.815592 systemd-journald[1488]: Time spent on flushing to /var/log/journal/ec224de6ae103bedeaa80411cb97a228 is 74.389ms for 1174 entries. Feb 9 19:14:51.815592 systemd-journald[1488]: System Journal (/var/log/journal/ec224de6ae103bedeaa80411cb97a228) is 8.0M, max 195.6M, 187.6M free. Feb 9 19:14:51.906829 systemd-journald[1488]: Received client request to flush runtime journal. Feb 9 19:14:51.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:51.812682 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:14:51.819601 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:14:51.821695 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:14:51.862325 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:14:51.908346 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:14:51.913021 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:14:51.916958 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:14:52.007899 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:14:52.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:52.021491 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:14:52.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:52.025514 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:14:52.041265 udevadm[1530]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:14:52.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:52.697000 audit: BPF prog-id=21 op=LOAD Feb 9 19:14:52.697000 audit: BPF prog-id=22 op=LOAD Feb 9 19:14:52.697000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:14:52.697000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:14:52.695607 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:14:52.699799 systemd[1]: Starting systemd-udevd.service... Feb 9 19:14:52.735863 systemd-udevd[1531]: Using default interface naming scheme 'v252'. Feb 9 19:14:52.778097 systemd[1]: Started systemd-udevd.service. Feb 9 19:14:52.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:52.780000 audit: BPF prog-id=23 op=LOAD Feb 9 19:14:52.784208 systemd[1]: Starting systemd-networkd.service... Feb 9 19:14:52.790000 audit: BPF prog-id=24 op=LOAD Feb 9 19:14:52.790000 audit: BPF prog-id=25 op=LOAD Feb 9 19:14:52.790000 audit: BPF prog-id=26 op=LOAD Feb 9 19:14:52.793460 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:14:52.880287 systemd[1]: Started systemd-userdbd.service. Feb 9 19:14:52.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:52.911750 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:14:52.937756 (udev-worker)[1551]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:14:53.025073 systemd-networkd[1536]: lo: Link UP Feb 9 19:14:53.025096 systemd-networkd[1536]: lo: Gained carrier Feb 9 19:14:53.026077 systemd-networkd[1536]: Enumeration completed Feb 9 19:14:53.026239 systemd[1]: Started systemd-networkd.service. Feb 9 19:14:53.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.030233 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:14:53.032328 systemd-networkd[1536]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:14:53.041169 systemd-networkd[1536]: eth0: Link UP Feb 9 19:14:53.041408 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:14:53.041501 systemd-networkd[1536]: eth0: Gained carrier Feb 9 19:14:53.055562 systemd-networkd[1536]: eth0: DHCPv4 address 172.31.23.196/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:14:53.145296 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1540) Feb 9 19:14:53.253379 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:14:53.256997 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:14:53.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.261067 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:14:53.327509 lvm[1650]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:14:53.363866 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:14:53.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.365878 systemd[1]: Reached target cryptsetup.target. Feb 9 19:14:53.369629 systemd[1]: Starting lvm2-activation.service... Feb 9 19:14:53.377246 lvm[1651]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:14:53.410944 systemd[1]: Finished lvm2-activation.service. Feb 9 19:14:53.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.412857 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:14:53.414575 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:14:53.414630 systemd[1]: Reached target local-fs.target. Feb 9 19:14:53.416206 systemd[1]: Reached target machines.target. Feb 9 19:14:53.420285 systemd[1]: Starting ldconfig.service... Feb 9 19:14:53.423175 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:14:53.423320 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:14:53.425899 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:14:53.432455 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:14:53.437091 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:14:53.439163 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:14:53.439321 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:14:53.442905 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:14:53.455428 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1653 (bootctl) Feb 9 19:14:53.460211 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:14:53.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.472744 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:14:53.487976 systemd-tmpfiles[1656]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:14:53.492483 systemd-tmpfiles[1656]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:14:53.496458 systemd-tmpfiles[1656]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:14:53.537670 systemd-fsck[1661]: fsck.fat 4.2 (2021-01-31) Feb 9 19:14:53.537670 systemd-fsck[1661]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 9 19:14:53.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.540025 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:14:53.544707 systemd[1]: Mounting boot.mount... Feb 9 19:14:53.570142 systemd[1]: Mounted boot.mount. Feb 9 19:14:53.591531 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:14:53.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.820913 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:14:53.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.825666 systemd[1]: Starting audit-rules.service... Feb 9 19:14:53.829849 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:14:53.834827 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:14:53.837000 audit: BPF prog-id=27 op=LOAD Feb 9 19:14:53.843681 systemd[1]: Starting systemd-resolved.service... Feb 9 19:14:53.845000 audit: BPF prog-id=28 op=LOAD Feb 9 19:14:53.849381 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:14:53.855581 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:14:53.885389 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:14:53.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.887616 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:14:53.894000 audit[1686]: SYSTEM_BOOT pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.900922 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:14:53.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.941373 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:14:53.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:14:53.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:14:53.971000 audit[1698]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcfbb1fc0 a2=420 a3=0 items=0 ppid=1677 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:14:53.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:14:53.973764 augenrules[1698]: No rules Feb 9 19:14:53.975865 systemd[1]: Finished audit-rules.service. Feb 9 19:14:54.015217 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:14:54.017560 systemd[1]: Reached target time-set.target. Feb 9 19:14:54.037447 systemd-resolved[1681]: Positive Trust Anchors: Feb 9 19:14:54.037959 systemd-resolved[1681]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:14:54.038125 systemd-resolved[1681]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:14:54.067990 systemd-resolved[1681]: Defaulting to hostname 'linux'. Feb 9 19:14:54.071557 systemd[1]: Started systemd-resolved.service. Feb 9 19:14:54.073449 systemd[1]: Reached target network.target. Feb 9 19:14:54.075058 systemd[1]: Reached target nss-lookup.target. Feb 9 19:14:54.095347 systemd-timesyncd[1682]: Contacted time server 129.146.193.200:123 (0.flatcar.pool.ntp.org). Feb 9 19:14:54.095581 systemd-timesyncd[1682]: Initial clock synchronization to Fri 2024-02-09 19:14:53.864508 UTC. Feb 9 19:14:54.170598 ldconfig[1652]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:14:54.193840 systemd[1]: Finished ldconfig.service. Feb 9 19:14:54.197848 systemd[1]: Starting systemd-update-done.service... Feb 9 19:14:54.211814 systemd[1]: Finished systemd-update-done.service. Feb 9 19:14:54.213754 systemd[1]: Reached target sysinit.target. Feb 9 19:14:54.215567 systemd[1]: Started motdgen.path. Feb 9 19:14:54.217033 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:14:54.219445 systemd[1]: Started logrotate.timer. Feb 9 19:14:54.221037 systemd[1]: Started mdadm.timer. Feb 9 19:14:54.222388 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:14:54.224083 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:14:54.224142 systemd[1]: Reached target paths.target. Feb 9 19:14:54.225638 systemd[1]: Reached target timers.target. Feb 9 19:14:54.228447 systemd[1]: Listening on dbus.socket. Feb 9 19:14:54.232087 systemd[1]: Starting docker.socket... Feb 9 19:14:54.238360 systemd[1]: Listening on sshd.socket. Feb 9 19:14:54.240120 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:14:54.241048 systemd[1]: Listening on docker.socket. Feb 9 19:14:54.242806 systemd[1]: Reached target sockets.target. Feb 9 19:14:54.244444 systemd[1]: Reached target basic.target. Feb 9 19:14:54.245983 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:14:54.246186 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:14:54.248282 systemd[1]: Starting containerd.service... Feb 9 19:14:54.254529 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:14:54.259184 systemd[1]: Starting dbus.service... Feb 9 19:14:54.265044 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:14:54.271952 systemd[1]: Starting extend-filesystems.service... Feb 9 19:14:54.273681 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:14:54.299690 jq[1710]: false Feb 9 19:14:54.279311 systemd[1]: Starting motdgen.service... Feb 9 19:14:54.283093 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:14:54.288675 systemd[1]: Starting prepare-critools.service... Feb 9 19:14:54.293633 systemd[1]: Starting prepare-helm.service... Feb 9 19:14:54.299562 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:14:54.305322 systemd[1]: Starting sshd-keygen.service... Feb 9 19:14:54.313586 systemd[1]: Starting systemd-logind.service... Feb 9 19:14:54.315373 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:14:54.315527 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:14:54.316995 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:14:54.320962 systemd[1]: Starting update-engine.service... Feb 9 19:14:54.325106 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:14:54.333200 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:14:54.333650 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:14:54.334109 jq[1725]: true Feb 9 19:14:54.367199 jq[1728]: true Feb 9 19:14:54.396981 tar[1732]: ./ Feb 9 19:14:54.396981 tar[1732]: ./macvlan Feb 9 19:14:54.401806 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:14:54.402196 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:14:54.414591 tar[1729]: linux-arm64/helm Feb 9 19:14:54.417512 tar[1730]: crictl Feb 9 19:14:54.488800 dbus-daemon[1709]: [system] SELinux support is enabled Feb 9 19:14:54.489069 systemd[1]: Started dbus.service. Feb 9 19:14:54.494244 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:14:54.494325 systemd[1]: Reached target system-config.target. Feb 9 19:14:54.496200 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:14:54.496235 systemd[1]: Reached target user-config.target. Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p1 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p2 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p3 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found usr Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p4 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p6 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p7 Feb 9 19:14:54.507180 extend-filesystems[1711]: Found nvme0n1p9 Feb 9 19:14:54.507180 extend-filesystems[1711]: Checking size of /dev/nvme0n1p9 Feb 9 19:14:54.551621 dbus-daemon[1709]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1536 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:14:54.517986 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:14:54.518349 systemd[1]: Finished motdgen.service. Feb 9 19:14:54.559658 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:14:54.567435 bash[1762]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:14:54.568443 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:14:54.603446 extend-filesystems[1711]: Resized partition /dev/nvme0n1p9 Feb 9 19:14:54.608405 extend-filesystems[1769]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:14:54.696292 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 19:14:54.702594 update_engine[1724]: I0209 19:14:54.691727 1724 main.cc:92] Flatcar Update Engine starting Feb 9 19:14:54.706827 systemd-logind[1721]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 19:14:54.712382 systemd-logind[1721]: New seat seat0. Feb 9 19:14:54.719284 systemd[1]: Started systemd-logind.service. Feb 9 19:14:54.724242 env[1733]: time="2024-02-09T19:14:54.724158279Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:14:54.727404 systemd[1]: Started update-engine.service. Feb 9 19:14:54.729683 update_engine[1724]: I0209 19:14:54.728749 1724 update_check_scheduler.cc:74] Next update check in 9m17s Feb 9 19:14:54.732571 systemd[1]: Started locksmithd.service. Feb 9 19:14:54.781535 systemd-networkd[1536]: eth0: Gained IPv6LL Feb 9 19:14:54.788039 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:14:54.790761 systemd[1]: Reached target network-online.target. Feb 9 19:14:54.795164 systemd[1]: Started amazon-ssm-agent.service. Feb 9 19:14:54.800059 systemd[1]: Started nvidia.service. Feb 9 19:14:54.899555 tar[1732]: ./static Feb 9 19:14:55.099638 env[1733]: time="2024-02-09T19:14:55.099488815Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:14:55.099805 env[1733]: time="2024-02-09T19:14:55.099765145Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132231657Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132371051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132744075Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132783769Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132813697Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132837599Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.132989021Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.133455895Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.133701796Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:14:55.134048 env[1733]: time="2024-02-09T19:14:55.133737131Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:14:55.134722 env[1733]: time="2024-02-09T19:14:55.133835643Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:14:55.134722 env[1733]: time="2024-02-09T19:14:55.133861060Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:14:55.189206 dbus-daemon[1709]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:14:55.189527 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:14:55.233279 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 19:14:55.261907 extend-filesystems[1769]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 19:14:55.261907 extend-filesystems[1769]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 19:14:55.261907 extend-filesystems[1769]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 19:14:55.299307 extend-filesystems[1711]: Resized filesystem in /dev/nvme0n1p9 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292296471Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292430353Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292463533Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292553153Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292612973Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292647772Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.292703444Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.293775153Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.293855298Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.293912566Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.293943170Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.293999704Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.294327020Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:14:55.304757 env[1733]: time="2024-02-09T19:14:55.294563482Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:14:55.299625 systemd[1]: Started containerd.service. Feb 9 19:14:55.305618 dbus-daemon[1709]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1765 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295361798Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295434962Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295494480Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295612734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295644852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295699533Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295728645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295817228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295868249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295901137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.295929946Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.296001281Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.296379992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.296414907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309081 env[1733]: time="2024-02-09T19:14:55.296472513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.309909 env[1733]: time="2024-02-09T19:14:55.296502161Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:14:55.309909 env[1733]: time="2024-02-09T19:14:55.296559593Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:14:55.309909 env[1733]: time="2024-02-09T19:14:55.296610544Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:14:55.309909 env[1733]: time="2024-02-09T19:14:55.296649784Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:14:55.309909 env[1733]: time="2024-02-09T19:14:55.296732737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.297351627Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.297476746Z" level=info msg="Connect containerd service" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.297541239Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.298598125Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.299049930Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.299225464Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.301657449Z" level=info msg="containerd successfully booted in 0.583749s" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.305363214Z" level=info msg="Start subscribing containerd event" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.305489148Z" level=info msg="Start recovering state" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.305889081Z" level=info msg="Start event monitor" Feb 9 19:14:55.310191 env[1733]: time="2024-02-09T19:14:55.305959157Z" level=info msg="Start snapshots syncer" Feb 9 19:14:55.326879 env[1733]: time="2024-02-09T19:14:55.313557211Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:14:55.326879 env[1733]: time="2024-02-09T19:14:55.313625912Z" level=info msg="Start streaming server" Feb 9 19:14:55.310440 systemd[1]: Starting polkit.service... Feb 9 19:14:55.322447 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:14:55.322768 systemd[1]: Finished extend-filesystems.service. Feb 9 19:14:55.357135 amazon-ssm-agent[1784]: 2024/02/09 19:14:55 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 19:14:55.360759 polkitd[1869]: Started polkitd version 121 Feb 9 19:14:55.381159 amazon-ssm-agent[1784]: Initializing new seelog logger Feb 9 19:14:55.394722 amazon-ssm-agent[1784]: New Seelog Logger Creation Complete Feb 9 19:14:55.395658 amazon-ssm-agent[1784]: 2024/02/09 19:14:55 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:14:55.397962 amazon-ssm-agent[1784]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:14:55.398602 amazon-ssm-agent[1784]: 2024/02/09 19:14:55 processing appconfig overrides Feb 9 19:14:55.411447 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:14:55.413728 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:14:55.421713 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:14:55.438886 polkitd[1869]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:14:55.439189 polkitd[1869]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:14:55.441138 polkitd[1869]: Finished loading, compiling and executing 2 rules Feb 9 19:14:55.443703 tar[1732]: ./vlan Feb 9 19:14:55.454460 dbus-daemon[1709]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:14:55.455152 systemd[1]: Started polkit.service. Feb 9 19:14:55.457015 polkitd[1869]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:14:55.527106 coreos-metadata[1708]: Feb 09 19:14:55.527 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 19:14:55.528823 coreos-metadata[1708]: Feb 09 19:14:55.528 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 19:14:55.529793 coreos-metadata[1708]: Feb 09 19:14:55.529 INFO Fetch successful Feb 9 19:14:55.529793 coreos-metadata[1708]: Feb 09 19:14:55.529 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:14:55.530715 coreos-metadata[1708]: Feb 09 19:14:55.530 INFO Fetch successful Feb 9 19:14:55.536975 unknown[1708]: wrote ssh authorized keys file for user: core Feb 9 19:14:55.559711 systemd-hostnamed[1765]: Hostname set to (transient) Feb 9 19:14:55.559728 systemd-resolved[1681]: System hostname changed to 'ip-172-31-23-196'. Feb 9 19:14:55.566782 update-ssh-keys[1898]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:14:55.567792 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:14:55.631106 tar[1732]: ./portmap Feb 9 19:14:55.700497 tar[1732]: ./host-local Feb 9 19:14:55.762954 tar[1732]: ./vrf Feb 9 19:14:55.825531 tar[1732]: ./bridge Feb 9 19:14:55.925480 tar[1732]: ./tuning Feb 9 19:14:56.044236 tar[1732]: ./firewall Feb 9 19:14:56.107744 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Create new startup processor Feb 9 19:14:56.108340 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 19:14:56.108502 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing bookkeeping folders Feb 9 19:14:56.108641 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO removing the completed state files Feb 9 19:14:56.108769 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing bookkeeping folders for long running plugins Feb 9 19:14:56.108914 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 19:14:56.109050 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing healthcheck folders for long running plugins Feb 9 19:14:56.109183 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing locations for inventory plugin Feb 9 19:14:56.109341 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing default location for custom inventory Feb 9 19:14:56.109482 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing default location for file inventory Feb 9 19:14:56.109632 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Initializing default location for role inventory Feb 9 19:14:56.109769 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Init the cloudwatchlogs publisher Feb 9 19:14:56.109905 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 19:14:56.110042 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:configureDocker Feb 9 19:14:56.110178 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 19:14:56.110339 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:configurePackage Feb 9 19:14:56.110469 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 19:14:56.110611 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 19:14:56.110749 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:downloadContent Feb 9 19:14:56.110882 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:runDocument Feb 9 19:14:56.110991 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 19:14:56.111127 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 19:14:56.111266 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 19:14:56.111378 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO OS: linux, Arch: arm64 Feb 9 19:14:56.112644 amazon-ssm-agent[1784]: datastore file /var/lib/amazon/ssm/i-0349320adf65d8161/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 19:14:56.126481 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 19:14:56.214280 tar[1732]: ./host-device Feb 9 19:14:56.227260 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 19:14:56.322370 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 19:14:56.352770 tar[1732]: ./sbr Feb 9 19:14:56.416870 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] Starting message polling Feb 9 19:14:56.486271 tar[1732]: ./loopback Feb 9 19:14:56.511366 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 19:14:56.552926 tar[1732]: ./dhcp Feb 9 19:14:56.606071 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [instanceID=i-0349320adf65d8161] Starting association polling Feb 9 19:14:56.700963 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 19:14:56.796126 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 19:14:56.869541 systemd[1]: Finished prepare-critools.service. Feb 9 19:14:56.879962 tar[1732]: ./ptp Feb 9 19:14:56.891367 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 19:14:56.914234 tar[1729]: linux-arm64/LICENSE Feb 9 19:14:56.914921 tar[1729]: linux-arm64/README.md Feb 9 19:14:56.928787 systemd[1]: Finished prepare-helm.service. Feb 9 19:14:56.960760 tar[1732]: ./ipvlan Feb 9 19:14:56.986885 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 19:14:57.020087 tar[1732]: ./bandwidth Feb 9 19:14:57.082687 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 19:14:57.097568 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:14:57.129549 locksmithd[1783]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:14:57.178602 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [OfflineService] Starting document processing engine... Feb 9 19:14:57.274639 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [OfflineService] [EngineProcessor] Starting Feb 9 19:14:57.370929 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 19:14:57.422080 sshd_keygen[1731]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:14:57.457499 systemd[1]: Finished sshd-keygen.service. Feb 9 19:14:57.462091 systemd[1]: Starting issuegen.service... Feb 9 19:14:57.467360 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [OfflineService] Starting message polling Feb 9 19:14:57.472017 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:14:57.472389 systemd[1]: Finished issuegen.service. Feb 9 19:14:57.477037 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:14:57.490492 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:14:57.495244 systemd[1]: Started getty@tty1.service. Feb 9 19:14:57.499793 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:14:57.501904 systemd[1]: Reached target getty.target. Feb 9 19:14:57.503641 systemd[1]: Reached target multi-user.target. Feb 9 19:14:57.507945 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:14:57.522368 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:14:57.522766 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:14:57.525487 systemd[1]: Startup finished in 1.129s (kernel) + 11.430s (initrd) + 10.503s (userspace) = 23.063s. Feb 9 19:14:57.564095 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [OfflineService] Starting send replies to MDS Feb 9 19:14:57.661021 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 19:14:57.758004 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 19:14:57.855217 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:14:57.952644 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 19:14:58.050293 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 19:14:58.148068 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 19:14:58.246187 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0349320adf65d8161, requestId: b9e9227c-875e-4edb-b6b2-b1d4579b4288 Feb 9 19:14:58.344318 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] listening reply. Feb 9 19:14:58.442674 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 19:14:58.541438 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [StartupProcessor] Executing startup processor tasks Feb 9 19:14:58.640721 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 19:14:58.739709 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 19:14:58.838936 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 19:14:58.938293 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0349320adf65d8161?role=subscribe&stream=input Feb 9 19:14:59.037849 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0349320adf65d8161?role=subscribe&stream=input Feb 9 19:14:59.137762 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 19:14:59.237711 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 19:14:59.338003 amazon-ssm-agent[1784]: 2024-02-09 19:14:56 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 19:15:03.241271 systemd[1]: Created slice system-sshd.slice. Feb 9 19:15:03.244632 systemd[1]: Started sshd@0-172.31.23.196:22-147.75.109.163:53376.service. Feb 9 19:15:03.424006 sshd[1937]: Accepted publickey for core from 147.75.109.163 port 53376 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:03.428453 sshd[1937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:03.445668 systemd[1]: Created slice user-500.slice. Feb 9 19:15:03.448573 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:15:03.455410 systemd-logind[1721]: New session 1 of user core. Feb 9 19:15:03.469001 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:15:03.473876 systemd[1]: Starting user@500.service... Feb 9 19:15:03.480730 (systemd)[1940]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:03.654984 systemd[1940]: Queued start job for default target default.target. Feb 9 19:15:03.656043 systemd[1940]: Reached target paths.target. Feb 9 19:15:03.656096 systemd[1940]: Reached target sockets.target. Feb 9 19:15:03.656128 systemd[1940]: Reached target timers.target. Feb 9 19:15:03.656159 systemd[1940]: Reached target basic.target. Feb 9 19:15:03.656297 systemd[1940]: Reached target default.target. Feb 9 19:15:03.656365 systemd[1940]: Startup finished in 163ms. Feb 9 19:15:03.657521 systemd[1]: Started user@500.service. Feb 9 19:15:03.661535 systemd[1]: Started session-1.scope. Feb 9 19:15:03.811894 systemd[1]: Started sshd@1-172.31.23.196:22-147.75.109.163:53380.service. Feb 9 19:15:03.996610 sshd[1949]: Accepted publickey for core from 147.75.109.163 port 53380 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:03.999129 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:04.008412 systemd[1]: Started session-2.scope. Feb 9 19:15:04.009210 systemd-logind[1721]: New session 2 of user core. Feb 9 19:15:04.144693 sshd[1949]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:04.150483 systemd[1]: sshd@1-172.31.23.196:22-147.75.109.163:53380.service: Deactivated successfully. Feb 9 19:15:04.150531 systemd-logind[1721]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:15:04.151752 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:15:04.153615 systemd-logind[1721]: Removed session 2. Feb 9 19:15:04.173695 systemd[1]: Started sshd@2-172.31.23.196:22-147.75.109.163:53396.service. Feb 9 19:15:04.351378 sshd[1955]: Accepted publickey for core from 147.75.109.163 port 53396 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:04.353186 sshd[1955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:04.362841 systemd[1]: Started session-3.scope. Feb 9 19:15:04.364374 systemd-logind[1721]: New session 3 of user core. Feb 9 19:15:04.490103 sshd[1955]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:04.494891 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:15:04.496092 systemd[1]: sshd@2-172.31.23.196:22-147.75.109.163:53396.service: Deactivated successfully. Feb 9 19:15:04.497832 systemd-logind[1721]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:15:04.500657 systemd-logind[1721]: Removed session 3. Feb 9 19:15:04.516768 systemd[1]: Started sshd@3-172.31.23.196:22-147.75.109.163:49684.service. Feb 9 19:15:04.684814 sshd[1961]: Accepted publickey for core from 147.75.109.163 port 49684 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:04.687772 sshd[1961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:04.695544 systemd-logind[1721]: New session 4 of user core. Feb 9 19:15:04.696434 systemd[1]: Started session-4.scope. Feb 9 19:15:04.824055 sshd[1961]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:04.829887 systemd-logind[1721]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:15:04.830580 systemd[1]: sshd@3-172.31.23.196:22-147.75.109.163:49684.service: Deactivated successfully. Feb 9 19:15:04.831937 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:15:04.833855 systemd-logind[1721]: Removed session 4. Feb 9 19:15:04.858038 systemd[1]: Started sshd@4-172.31.23.196:22-147.75.109.163:49694.service. Feb 9 19:15:05.033800 sshd[1967]: Accepted publickey for core from 147.75.109.163 port 49694 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:05.036762 sshd[1967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:05.044514 systemd-logind[1721]: New session 5 of user core. Feb 9 19:15:05.045462 systemd[1]: Started session-5.scope. Feb 9 19:15:05.163568 sudo[1970]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:15:05.164130 sudo[1970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:15:05.176534 dbus-daemon[1709]: avc: received setenforce notice (enforcing=1) Feb 9 19:15:05.179619 sudo[1970]: pam_unix(sudo:session): session closed for user root Feb 9 19:15:05.204872 sshd[1967]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:05.210426 systemd-logind[1721]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:15:05.211147 systemd[1]: sshd@4-172.31.23.196:22-147.75.109.163:49694.service: Deactivated successfully. Feb 9 19:15:05.212583 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:15:05.214414 systemd-logind[1721]: Removed session 5. Feb 9 19:15:05.236925 systemd[1]: Started sshd@5-172.31.23.196:22-147.75.109.163:49698.service. Feb 9 19:15:05.413019 sshd[1974]: Accepted publickey for core from 147.75.109.163 port 49698 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:05.416492 sshd[1974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:05.424793 systemd-logind[1721]: New session 6 of user core. Feb 9 19:15:05.425921 systemd[1]: Started session-6.scope. Feb 9 19:15:05.535037 sudo[1978]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:15:05.536036 sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:15:05.541504 sudo[1978]: pam_unix(sudo:session): session closed for user root Feb 9 19:15:05.550893 sudo[1977]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:15:05.551445 sudo[1977]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:15:05.569476 systemd[1]: Stopping audit-rules.service... Feb 9 19:15:05.570000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:15:05.572524 auditctl[1981]: No rules Feb 9 19:15:05.573526 kernel: kauditd_printk_skb: 72 callbacks suppressed Feb 9 19:15:05.573654 kernel: audit: type=1305 audit(1707506105.570:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:15:05.574329 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:15:05.574732 systemd[1]: Stopped audit-rules.service. Feb 9 19:15:05.570000 audit[1981]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffde396960 a2=420 a3=0 items=0 ppid=1 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:05.580666 systemd[1]: Starting audit-rules.service... Feb 9 19:15:05.589538 kernel: audit: type=1300 audit(1707506105.570:166): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffde396960 a2=420 a3=0 items=0 ppid=1 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:05.570000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:15:05.593164 kernel: audit: type=1327 audit(1707506105.570:166): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:15:05.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.601746 kernel: audit: type=1131 audit(1707506105.573:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.622883 augenrules[1998]: No rules Feb 9 19:15:05.624553 systemd[1]: Finished audit-rules.service. Feb 9 19:15:05.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.626860 sudo[1977]: pam_unix(sudo:session): session closed for user root Feb 9 19:15:05.624000 audit[1977]: USER_END pid=1977 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.643065 kernel: audit: type=1130 audit(1707506105.623:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.643153 kernel: audit: type=1106 audit(1707506105.624:169): pid=1977 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.643423 kernel: audit: type=1104 audit(1707506105.624:170): pid=1977 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.624000 audit[1977]: CRED_DISP pid=1977 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.652626 sshd[1974]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:05.653000 audit[1974]: USER_END pid=1974 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.666773 systemd[1]: sshd@5-172.31.23.196:22-147.75.109.163:49698.service: Deactivated successfully. Feb 9 19:15:05.667993 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:15:05.653000 audit[1974]: CRED_DISP pid=1974 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.677180 kernel: audit: type=1106 audit(1707506105.653:171): pid=1974 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.677306 kernel: audit: type=1104 audit(1707506105.653:172): pid=1974 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.677936 systemd-logind[1721]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:15:05.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.196:22-147.75.109.163:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.688296 kernel: audit: type=1131 audit(1707506105.666:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.196:22-147.75.109.163:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.685790 systemd[1]: Started sshd@6-172.31.23.196:22-147.75.109.163:49712.service. Feb 9 19:15:05.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.196:22-147.75.109.163:49712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.691936 systemd-logind[1721]: Removed session 6. Feb 9 19:15:05.853000 audit[2004]: USER_ACCT pid=2004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.855229 sshd[2004]: Accepted publickey for core from 147.75.109.163 port 49712 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:15:05.855000 audit[2004]: CRED_ACQ pid=2004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.855000 audit[2004]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe943bbe0 a2=3 a3=1 items=0 ppid=1 pid=2004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:05.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:15:05.858203 sshd[2004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:15:05.867003 systemd[1]: Started session-7.scope. Feb 9 19:15:05.867827 systemd-logind[1721]: New session 7 of user core. Feb 9 19:15:05.875000 audit[2004]: USER_START pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.878000 audit[2006]: CRED_ACQ pid=2006 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:05.970000 audit[2007]: USER_ACCT pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.972179 sudo[2007]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:15:05.971000 audit[2007]: CRED_REFR pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:05.973205 sudo[2007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:15:05.975000 audit[2007]: USER_START pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:06.681378 systemd[1]: Starting docker.service... Feb 9 19:15:06.754873 env[2022]: time="2024-02-09T19:15:06.754778107Z" level=info msg="Starting up" Feb 9 19:15:06.757178 env[2022]: time="2024-02-09T19:15:06.757132392Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:15:06.757371 env[2022]: time="2024-02-09T19:15:06.757342048Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:15:06.757499 env[2022]: time="2024-02-09T19:15:06.757467271Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:15:06.757606 env[2022]: time="2024-02-09T19:15:06.757579835Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:15:06.761481 env[2022]: time="2024-02-09T19:15:06.761431498Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:15:06.761665 env[2022]: time="2024-02-09T19:15:06.761634908Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:15:06.761798 env[2022]: time="2024-02-09T19:15:06.761764351Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:15:06.761907 env[2022]: time="2024-02-09T19:15:06.761879096Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:15:06.814387 env[2022]: time="2024-02-09T19:15:06.814322359Z" level=info msg="Loading containers: start." Feb 9 19:15:06.893000 audit[2052]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.893000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc5e96740 a2=0 a3=1 items=0 ppid=2022 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:15:06.897000 audit[2054]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.897000 audit[2054]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd8101f10 a2=0 a3=1 items=0 ppid=2022 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:15:06.902000 audit[2056]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.902000 audit[2056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffd980de0 a2=0 a3=1 items=0 ppid=2022 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:15:06.906000 audit[2058]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.906000 audit[2058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd73329e0 a2=0 a3=1 items=0 ppid=2022 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:15:06.912000 audit[2060]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.912000 audit[2060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe9fc79f0 a2=0 a3=1 items=0 ppid=2022 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:15:06.936000 audit[2065]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.936000 audit[2065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff67fb10 a2=0 a3=1 items=0 ppid=2022 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.936000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:15:06.949000 audit[2067]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.949000 audit[2067]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0374bf0 a2=0 a3=1 items=0 ppid=2022 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.949000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:15:06.954000 audit[2069]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.954000 audit[2069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffedd17890 a2=0 a3=1 items=0 ppid=2022 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:15:06.958000 audit[2071]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.958000 audit[2071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffec7f8120 a2=0 a3=1 items=0 ppid=2022 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:15:06.973000 audit[2075]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.973000 audit[2075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff85d0670 a2=0 a3=1 items=0 ppid=2022 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:15:06.975000 audit[2076]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:06.975000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc09ff750 a2=0 a3=1 items=0 ppid=2022 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:06.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:15:06.987282 kernel: Initializing XFRM netlink socket Feb 9 19:15:07.029776 env[2022]: time="2024-02-09T19:15:07.029709294Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:15:07.033196 (udev-worker)[2032]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:15:07.061000 audit[2084]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.061000 audit[2084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffec4529d0 a2=0 a3=1 items=0 ppid=2022 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:15:07.080000 audit[2087]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.080000 audit[2087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff0ab65f0 a2=0 a3=1 items=0 ppid=2022 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:15:07.089000 audit[2090]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.089000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd369d480 a2=0 a3=1 items=0 ppid=2022 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:15:07.094000 audit[2092]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.094000 audit[2092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcf51f8d0 a2=0 a3=1 items=0 ppid=2022 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:15:07.100000 audit[2094]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.100000 audit[2094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd34120a0 a2=0 a3=1 items=0 ppid=2022 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:15:07.105000 audit[2096]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.105000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffef9de6b0 a2=0 a3=1 items=0 ppid=2022 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:15:07.111000 audit[2098]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.111000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffffd7b3670 a2=0 a3=1 items=0 ppid=2022 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:15:07.127000 audit[2101]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.127000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff96e2300 a2=0 a3=1 items=0 ppid=2022 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.127000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:15:07.132000 audit[2103]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.132000 audit[2103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffed38c4d0 a2=0 a3=1 items=0 ppid=2022 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:15:07.137000 audit[2105]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.137000 audit[2105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe4ac4060 a2=0 a3=1 items=0 ppid=2022 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:15:07.141000 audit[2107]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.141000 audit[2107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcd852a10 a2=0 a3=1 items=0 ppid=2022 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:15:07.143237 systemd-networkd[1536]: docker0: Link UP Feb 9 19:15:07.159000 audit[2111]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.159000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda2c97f0 a2=0 a3=1 items=0 ppid=2022 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:15:07.161000 audit[2112]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:07.161000 audit[2112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd59a2a70 a2=0 a3=1 items=0 ppid=2022 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:07.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:15:07.163999 env[2022]: time="2024-02-09T19:15:07.163953738Z" level=info msg="Loading containers: done." Feb 9 19:15:07.200730 env[2022]: time="2024-02-09T19:15:07.200537630Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:15:07.201878 env[2022]: time="2024-02-09T19:15:07.201819818Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:15:07.202357 env[2022]: time="2024-02-09T19:15:07.202310095Z" level=info msg="Daemon has completed initialization" Feb 9 19:15:07.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:07.235783 systemd[1]: Started docker.service. Feb 9 19:15:07.254424 env[2022]: time="2024-02-09T19:15:07.254285766Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:15:07.292517 systemd[1]: Reloading. Feb 9 19:15:07.429786 /usr/lib/systemd/system-generators/torcx-generator[2162]: time="2024-02-09T19:15:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:15:07.429850 /usr/lib/systemd/system-generators/torcx-generator[2162]: time="2024-02-09T19:15:07Z" level=info msg="torcx already run" Feb 9 19:15:07.586658 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:15:07.586696 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:15:07.631607 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.787000 audit: BPF prog-id=37 op=LOAD Feb 9 19:15:07.787000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:15:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit: BPF prog-id=38 op=LOAD Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.788000 audit: BPF prog-id=39 op=LOAD Feb 9 19:15:07.788000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:15:07.788000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.790000 audit: BPF prog-id=40 op=LOAD Feb 9 19:15:07.790000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.795000 audit: BPF prog-id=41 op=LOAD Feb 9 19:15:07.795000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit: BPF prog-id=42 op=LOAD Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.796000 audit: BPF prog-id=43 op=LOAD Feb 9 19:15:07.796000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:15:07.796000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.798000 audit: BPF prog-id=44 op=LOAD Feb 9 19:15:07.798000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.802000 audit: BPF prog-id=45 op=LOAD Feb 9 19:15:07.802000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit: BPF prog-id=46 op=LOAD Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.806000 audit: BPF prog-id=47 op=LOAD Feb 9 19:15:07.806000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:15:07.806000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit: BPF prog-id=48 op=LOAD Feb 9 19:15:07.808000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit: BPF prog-id=49 op=LOAD Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.808000 audit: BPF prog-id=50 op=LOAD Feb 9 19:15:07.808000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:15:07.808000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit: BPF prog-id=51 op=LOAD Feb 9 19:15:07.811000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit: BPF prog-id=52 op=LOAD Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.811000 audit: BPF prog-id=53 op=LOAD Feb 9 19:15:07.811000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:15:07.811000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:07.813000 audit: BPF prog-id=54 op=LOAD Feb 9 19:15:07.814000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:15:07.851220 systemd[1]: Started kubelet.service. Feb 9 19:15:07.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:07.996467 kubelet[2214]: E0209 19:15:07.996123 2214 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:15:08.002912 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:15:08.003216 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:15:08.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:15:08.389270 env[1733]: time="2024-02-09T19:15:08.389152242Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 19:15:09.068739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount884885214.mount: Deactivated successfully. Feb 9 19:15:12.382588 env[1733]: time="2024-02-09T19:15:12.382523845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:12.385757 env[1733]: time="2024-02-09T19:15:12.385702379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:12.389080 env[1733]: time="2024-02-09T19:15:12.389010067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:12.392620 env[1733]: time="2024-02-09T19:15:12.392552674Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:12.394551 env[1733]: time="2024-02-09T19:15:12.394495682Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 19:15:12.412474 env[1733]: time="2024-02-09T19:15:12.412400945Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 19:15:15.701988 env[1733]: time="2024-02-09T19:15:15.701887627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:15.705525 env[1733]: time="2024-02-09T19:15:15.705443546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:15.709474 env[1733]: time="2024-02-09T19:15:15.709387298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:15.713298 env[1733]: time="2024-02-09T19:15:15.713186679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:15.716345 env[1733]: time="2024-02-09T19:15:15.715043280Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 19:15:15.735940 env[1733]: time="2024-02-09T19:15:15.735888677Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 19:15:17.453485 env[1733]: time="2024-02-09T19:15:17.453386714Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:17.456918 env[1733]: time="2024-02-09T19:15:17.456840203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:17.461694 env[1733]: time="2024-02-09T19:15:17.461617810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:17.467740 env[1733]: time="2024-02-09T19:15:17.467640361Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:17.470698 env[1733]: time="2024-02-09T19:15:17.469911870Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 19:15:17.489298 env[1733]: time="2024-02-09T19:15:17.489219972Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:15:18.164992 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:15:18.165427 systemd[1]: Stopped kubelet.service. Feb 9 19:15:18.177516 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 9 19:15:18.177695 kernel: audit: type=1130 audit(1707506118.164:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.168658 systemd[1]: Started kubelet.service. Feb 9 19:15:18.186336 kernel: audit: type=1131 audit(1707506118.164:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.194605 kernel: audit: type=1130 audit(1707506118.167:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:18.304964 kubelet[2248]: E0209 19:15:18.304854 2248 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:15:18.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:15:18.322906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:15:18.323245 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:15:18.332385 kernel: audit: type=1131 audit(1707506118.322:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:15:19.253620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2822447217.mount: Deactivated successfully. Feb 9 19:15:19.969191 env[1733]: time="2024-02-09T19:15:19.969125350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:19.972576 env[1733]: time="2024-02-09T19:15:19.972514802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:19.975362 env[1733]: time="2024-02-09T19:15:19.975299106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:19.977844 env[1733]: time="2024-02-09T19:15:19.977757308Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:19.979417 env[1733]: time="2024-02-09T19:15:19.979345317Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 19:15:19.998108 env[1733]: time="2024-02-09T19:15:19.998046709Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:15:20.518237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1916124528.mount: Deactivated successfully. Feb 9 19:15:20.529594 env[1733]: time="2024-02-09T19:15:20.529506575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:20.532613 env[1733]: time="2024-02-09T19:15:20.532553662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:20.535844 env[1733]: time="2024-02-09T19:15:20.535786906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:20.539971 env[1733]: time="2024-02-09T19:15:20.539880377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:20.543395 env[1733]: time="2024-02-09T19:15:20.542057778Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 19:15:20.561421 env[1733]: time="2024-02-09T19:15:20.561370320Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 19:15:21.680378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2481498178.mount: Deactivated successfully. Feb 9 19:15:25.300195 env[1733]: time="2024-02-09T19:15:25.300104744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:25.303541 env[1733]: time="2024-02-09T19:15:25.303482015Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:25.308893 env[1733]: time="2024-02-09T19:15:25.308835308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:25.312129 env[1733]: time="2024-02-09T19:15:25.312057440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:25.313839 env[1733]: time="2024-02-09T19:15:25.313772935Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 19:15:25.331882 env[1733]: time="2024-02-09T19:15:25.331831144Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 19:15:25.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:25.570281 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:15:25.579349 kernel: audit: type=1131 audit(1707506125.570:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:25.603000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:15:25.603000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:15:25.608447 kernel: audit: type=1334 audit(1707506125.603:421): prog-id=50 op=UNLOAD Feb 9 19:15:25.608553 kernel: audit: type=1334 audit(1707506125.603:422): prog-id=49 op=UNLOAD Feb 9 19:15:25.608617 kernel: audit: type=1334 audit(1707506125.603:423): prog-id=48 op=UNLOAD Feb 9 19:15:25.603000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:15:25.970576 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount806688040.mount: Deactivated successfully. Feb 9 19:15:26.407106 amazon-ssm-agent[1784]: 2024-02-09 19:15:26 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 19:15:26.669756 env[1733]: time="2024-02-09T19:15:26.669697762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:26.673142 env[1733]: time="2024-02-09T19:15:26.673075101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:26.676205 env[1733]: time="2024-02-09T19:15:26.676150917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:26.679222 env[1733]: time="2024-02-09T19:15:26.679166232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:26.680419 env[1733]: time="2024-02-09T19:15:26.680353908Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 19:15:28.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.414945 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 19:15:28.415347 systemd[1]: Stopped kubelet.service. Feb 9 19:15:28.419162 systemd[1]: Started kubelet.service. Feb 9 19:15:28.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.438849 kernel: audit: type=1130 audit(1707506128.414:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.439019 kernel: audit: type=1131 audit(1707506128.414:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.453325 kernel: audit: type=1130 audit(1707506128.423:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:28.538956 kubelet[2326]: E0209 19:15:28.538881 2326 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:15:28.543190 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:15:28.543568 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:15:28.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:15:28.553307 kernel: audit: type=1131 audit(1707506128.542:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:15:32.112307 amazon-ssm-agent[1784]: 2024-02-09 19:15:32 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:15:33.725633 systemd[1]: Stopped kubelet.service. Feb 9 19:15:33.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:33.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:33.742720 kernel: audit: type=1130 audit(1707506133.726:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:33.742848 kernel: audit: type=1131 audit(1707506133.726:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:33.760385 systemd[1]: Reloading. Feb 9 19:15:33.878129 /usr/lib/systemd/system-generators/torcx-generator[2356]: time="2024-02-09T19:15:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:15:33.878194 /usr/lib/systemd/system-generators/torcx-generator[2356]: time="2024-02-09T19:15:33Z" level=info msg="torcx already run" Feb 9 19:15:34.046858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:15:34.046898 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:15:34.092580 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264543 kernel: audit: type=1400 audit(1707506134.249:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264621 kernel: audit: type=1400 audit(1707506134.249:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.272005 kernel: audit: type=1400 audit(1707506134.249:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.286933 kernel: audit: type=1400 audit(1707506134.249:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.287034 kernel: audit: type=1400 audit(1707506134.249:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.287084 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.298748 kernel: audit: type=1400 audit(1707506134.249:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.298853 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit: BPF prog-id=55 op=LOAD Feb 9 19:15:34.257000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit: BPF prog-id=56 op=LOAD Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.264000 audit: BPF prog-id=57 op=LOAD Feb 9 19:15:34.264000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:15:34.264000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.271000 audit: BPF prog-id=58 op=LOAD Feb 9 19:15:34.271000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit: BPF prog-id=59 op=LOAD Feb 9 19:15:34.279000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.286000 audit: BPF prog-id=60 op=LOAD Feb 9 19:15:34.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.302000 audit: BPF prog-id=63 op=LOAD Feb 9 19:15:34.302000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit: BPF prog-id=64 op=LOAD Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.306000 audit: BPF prog-id=65 op=LOAD Feb 9 19:15:34.306000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:15:34.306000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit: BPF prog-id=66 op=LOAD Feb 9 19:15:34.309000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit: BPF prog-id=67 op=LOAD Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.309000 audit: BPF prog-id=68 op=LOAD Feb 9 19:15:34.309000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:15:34.309000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:34.311000 audit: BPF prog-id=69 op=LOAD Feb 9 19:15:34.311000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:15:34.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:34.354862 systemd[1]: Started kubelet.service. Feb 9 19:15:34.460827 kubelet[2412]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:15:34.461399 kubelet[2412]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:15:34.461662 kubelet[2412]: I0209 19:15:34.461609 2412 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:15:34.464082 kubelet[2412]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:15:34.464229 kubelet[2412]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:15:35.096039 kubelet[2412]: I0209 19:15:35.095974 2412 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:15:35.096039 kubelet[2412]: I0209 19:15:35.096027 2412 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:15:35.096595 kubelet[2412]: I0209 19:15:35.096551 2412 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:15:35.102319 kubelet[2412]: E0209 19:15:35.102285 2412 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.23.196:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.102565 kubelet[2412]: I0209 19:15:35.102528 2412 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:15:35.106084 kubelet[2412]: W0209 19:15:35.106048 2412 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 19:15:35.107343 kubelet[2412]: I0209 19:15:35.107309 2412 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:15:35.107962 kubelet[2412]: I0209 19:15:35.107935 2412 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:15:35.108078 kubelet[2412]: I0209 19:15:35.108050 2412 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:15:35.108292 kubelet[2412]: I0209 19:15:35.108111 2412 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:15:35.108292 kubelet[2412]: I0209 19:15:35.108135 2412 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:15:35.108444 kubelet[2412]: I0209 19:15:35.108340 2412 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:15:35.113746 kubelet[2412]: I0209 19:15:35.113691 2412 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:15:35.113746 kubelet[2412]: I0209 19:15:35.113739 2412 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:15:35.113971 kubelet[2412]: I0209 19:15:35.113831 2412 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:15:35.113971 kubelet[2412]: I0209 19:15:35.113853 2412 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:15:35.116334 kubelet[2412]: W0209 19:15:35.116217 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.196:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.116524 kubelet[2412]: E0209 19:15:35.116355 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.196:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.117032 kubelet[2412]: I0209 19:15:35.116974 2412 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:15:35.118079 kubelet[2412]: W0209 19:15:35.118023 2412 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:15:35.119448 kubelet[2412]: I0209 19:15:35.119391 2412 server.go:1186] "Started kubelet" Feb 9 19:15:35.124000 audit[2412]: AVC avc: denied { mac_admin } for pid=2412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:35.124000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:35.124000 audit[2412]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e457a0 a1=4000b5f920 a2=4000e45770 a3=25 items=0 ppid=1 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.124000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:35.125000 audit[2412]: AVC avc: denied { mac_admin } for pid=2412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:35.125000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:35.125000 audit[2412]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e3cdc0 a1=4000b5f938 a2=4000e45830 a3=25 items=0 ppid=1 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.125000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:35.126988 kubelet[2412]: I0209 19:15:35.126309 2412 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:15:35.126988 kubelet[2412]: I0209 19:15:35.126410 2412 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:15:35.126988 kubelet[2412]: I0209 19:15:35.126545 2412 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:15:35.130682 kubelet[2412]: E0209 19:15:35.130520 2412 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c87b92d5f3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 119091187, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 119091187, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.23.196:6443/api/v1/namespaces/default/events": dial tcp 172.31.23.196:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:15:35.131156 kubelet[2412]: W0209 19:15:35.131101 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.196:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-196&limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.131386 kubelet[2412]: E0209 19:15:35.131347 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.196:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-196&limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.134463 kubelet[2412]: I0209 19:15:35.134409 2412 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:15:35.134794 kubelet[2412]: I0209 19:15:35.134755 2412 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:15:35.135882 kubelet[2412]: I0209 19:15:35.135829 2412 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:15:35.137415 kubelet[2412]: I0209 19:15:35.137355 2412 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:15:35.138894 kubelet[2412]: E0209 19:15:35.138832 2412 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:15:35.138894 kubelet[2412]: E0209 19:15:35.138887 2412 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:15:35.142287 kubelet[2412]: W0209 19:15:35.142181 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.196:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.142426 kubelet[2412]: E0209 19:15:35.142305 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.196:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.142522 kubelet[2412]: E0209 19:15:35.142418 2412 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.141000 audit[2422]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.141000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffec586010 a2=0 a3=1 items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:15:35.145000 audit[2423]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.145000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc86fa4d0 a2=0 a3=1 items=0 ppid=2412 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:15:35.154000 audit[2425]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.154000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc2dcc950 a2=0 a3=1 items=0 ppid=2412 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:15:35.159000 audit[2427]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.159000 audit[2427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff02c17a0 a2=0 a3=1 items=0 ppid=2412 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:15:35.187000 audit[2435]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.187000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffea00a4e0 a2=0 a3=1 items=0 ppid=2412 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:15:35.190000 audit[2436]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.190000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff26bd950 a2=0 a3=1 items=0 ppid=2412 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:15:35.195891 kubelet[2412]: I0209 19:15:35.195859 2412 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:15:35.196110 kubelet[2412]: I0209 19:15:35.196088 2412 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:15:35.196230 kubelet[2412]: I0209 19:15:35.196210 2412 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:15:35.199446 kubelet[2412]: I0209 19:15:35.199404 2412 policy_none.go:49] "None policy: Start" Feb 9 19:15:35.210655 kubelet[2412]: I0209 19:15:35.210610 2412 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:15:35.210655 kubelet[2412]: I0209 19:15:35.210660 2412 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:15:35.212000 audit[2439]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.212000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff192f480 a2=0 a3=1 items=0 ppid=2412 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:15:35.221617 systemd[1]: Created slice kubepods.slice. Feb 9 19:15:35.231345 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:15:35.232000 audit[2442]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.232000 audit[2442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff436b530 a2=0 a3=1 items=0 ppid=2412 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:15:35.238786 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:15:35.242820 kubelet[2412]: I0209 19:15:35.242784 2412 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:35.243653 kubelet[2412]: E0209 19:15:35.243625 2412 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.196:6443/api/v1/nodes\": dial tcp 172.31.23.196:6443: connect: connection refused" node="ip-172-31-23-196" Feb 9 19:15:35.244000 audit[2443]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.244000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd06dcd10 a2=0 a3=1 items=0 ppid=2412 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:15:35.246667 kubelet[2412]: I0209 19:15:35.246638 2412 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:15:35.247000 audit[2412]: AVC avc: denied { mac_admin } for pid=2412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:35.247000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:35.247000 audit[2412]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001177500 a1=4000d3ec48 a2=40011774d0 a3=25 items=0 ppid=1 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.247000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:35.249522 kubelet[2412]: I0209 19:15:35.249094 2412 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:15:35.249522 kubelet[2412]: I0209 19:15:35.249433 2412 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:15:35.250761 kubelet[2412]: E0209 19:15:35.250718 2412 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-23-196\" not found" Feb 9 19:15:35.252000 audit[2444]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.252000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc61491c0 a2=0 a3=1 items=0 ppid=2412 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:15:35.257000 audit[2446]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.257000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff051bdf0 a2=0 a3=1 items=0 ppid=2412 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:15:35.262000 audit[2448]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.262000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffcef31080 a2=0 a3=1 items=0 ppid=2412 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:15:35.267000 audit[2450]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.267000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffd14bcaa0 a2=0 a3=1 items=0 ppid=2412 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:15:35.272000 audit[2452]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.272000 audit[2452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffcbd65020 a2=0 a3=1 items=0 ppid=2412 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:15:35.277000 audit[2454]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.277000 audit[2454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffd117ea70 a2=0 a3=1 items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:15:35.279624 kubelet[2412]: I0209 19:15:35.279563 2412 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:15:35.279000 audit[2455]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.279000 audit[2455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff490a930 a2=0 a3=1 items=0 ppid=2412 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:15:35.280000 audit[2456]: NETFILTER_CFG table=mangle:42 family=10 entries=2 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.280000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdbc46d80 a2=0 a3=1 items=0 ppid=2412 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:15:35.282000 audit[2457]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.282000 audit[2457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffecaca350 a2=0 a3=1 items=0 ppid=2412 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:15:35.283000 audit[2458]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.283000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd26202b0 a2=0 a3=1 items=0 ppid=2412 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:15:35.285000 audit[2460]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:15:35.285000 audit[2460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4b95330 a2=0 a3=1 items=0 ppid=2412 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:15:35.287000 audit[2461]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.287000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff5c15ec0 a2=0 a3=1 items=0 ppid=2412 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:15:35.290000 audit[2462]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.290000 audit[2462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff8e46350 a2=0 a3=1 items=0 ppid=2412 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:15:35.294000 audit[2464]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.294000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe29447c0 a2=0 a3=1 items=0 ppid=2412 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:15:35.297000 audit[2465]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.297000 audit[2465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc40094a0 a2=0 a3=1 items=0 ppid=2412 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:15:35.299000 audit[2466]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.299000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff440c030 a2=0 a3=1 items=0 ppid=2412 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:15:35.304000 audit[2468]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.304000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffe629020 a2=0 a3=1 items=0 ppid=2412 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:15:35.309000 audit[2470]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.309000 audit[2470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe36b9d00 a2=0 a3=1 items=0 ppid=2412 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:15:35.315000 audit[2472]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.315000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc0b9c740 a2=0 a3=1 items=0 ppid=2412 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:15:35.320000 audit[2474]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.320000 audit[2474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffef996dc0 a2=0 a3=1 items=0 ppid=2412 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:15:35.327000 audit[2476]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.327000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffcda284a0 a2=0 a3=1 items=0 ppid=2412 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:15:35.329430 kubelet[2412]: I0209 19:15:35.329379 2412 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:15:35.329524 kubelet[2412]: I0209 19:15:35.329455 2412 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:15:35.329524 kubelet[2412]: I0209 19:15:35.329488 2412 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:15:35.329858 kubelet[2412]: E0209 19:15:35.329822 2412 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:15:35.330000 audit[2477]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.331574 kubelet[2412]: W0209 19:15:35.331338 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.196:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.331574 kubelet[2412]: E0209 19:15:35.331434 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.196:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.330000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0bf6b90 a2=0 a3=1 items=0 ppid=2412 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:15:35.333000 audit[2478]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.333000 audit[2478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7dcfe40 a2=0 a3=1 items=0 ppid=2412 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:15:35.335000 audit[2479]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:15:35.335000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe08982d0 a2=0 a3=1 items=0 ppid=2412 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:35.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:15:35.343100 kubelet[2412]: E0209 19:15:35.343038 2412 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.430402 kubelet[2412]: I0209 19:15:35.430341 2412 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:35.432651 kubelet[2412]: I0209 19:15:35.432605 2412 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:35.435779 kubelet[2412]: I0209 19:15:35.435581 2412 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:35.436852 kubelet[2412]: I0209 19:15:35.436819 2412 status_manager.go:698] "Failed to get status for pod" podUID=10f0a357d58351c9b244105b1e275554 pod="kube-system/kube-apiserver-ip-172-31-23-196" err="Get \"https://172.31.23.196:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-23-196\": dial tcp 172.31.23.196:6443: connect: connection refused" Feb 9 19:15:35.438573 kubelet[2412]: I0209 19:15:35.438536 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:35.438945 kubelet[2412]: I0209 19:15:35.438919 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:35.439117 kubelet[2412]: I0209 19:15:35.439096 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:35.439315 kubelet[2412]: I0209 19:15:35.439271 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:35.439530 kubelet[2412]: I0209 19:15:35.439508 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2fda3daed2a249fee0daa7b2365dee0-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-196\" (UID: \"a2fda3daed2a249fee0daa7b2365dee0\") " pod="kube-system/kube-scheduler-ip-172-31-23-196" Feb 9 19:15:35.440006 kubelet[2412]: I0209 19:15:35.439979 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-ca-certs\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:35.440207 kubelet[2412]: I0209 19:15:35.440184 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:35.440383 kubelet[2412]: I0209 19:15:35.440361 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:35.440545 kubelet[2412]: I0209 19:15:35.440524 2412 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:35.441616 kubelet[2412]: I0209 19:15:35.441585 2412 status_manager.go:698] "Failed to get status for pod" podUID=ec85d936214a4a1d75ed93c2286e161e pod="kube-system/kube-controller-manager-ip-172-31-23-196" err="Get \"https://172.31.23.196:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-23-196\": dial tcp 172.31.23.196:6443: connect: connection refused" Feb 9 19:15:35.445052 kubelet[2412]: I0209 19:15:35.445022 2412 status_manager.go:698] "Failed to get status for pod" podUID=a2fda3daed2a249fee0daa7b2365dee0 pod="kube-system/kube-scheduler-ip-172-31-23-196" err="Get \"https://172.31.23.196:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-23-196\": dial tcp 172.31.23.196:6443: connect: connection refused" Feb 9 19:15:35.448547 systemd[1]: Created slice kubepods-burstable-pod10f0a357d58351c9b244105b1e275554.slice. Feb 9 19:15:35.452054 kubelet[2412]: I0209 19:15:35.452019 2412 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:35.452906 kubelet[2412]: E0209 19:15:35.452878 2412 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.196:6443/api/v1/nodes\": dial tcp 172.31.23.196:6443: connect: connection refused" node="ip-172-31-23-196" Feb 9 19:15:35.469071 systemd[1]: Created slice kubepods-burstable-podec85d936214a4a1d75ed93c2286e161e.slice. Feb 9 19:15:35.479519 systemd[1]: Created slice kubepods-burstable-poda2fda3daed2a249fee0daa7b2365dee0.slice. Feb 9 19:15:35.744349 kubelet[2412]: E0209 19:15:35.744185 2412 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:35.764539 env[1733]: time="2024-02-09T19:15:35.764465473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-196,Uid:10f0a357d58351c9b244105b1e275554,Namespace:kube-system,Attempt:0,}" Feb 9 19:15:35.777294 env[1733]: time="2024-02-09T19:15:35.777182168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-196,Uid:ec85d936214a4a1d75ed93c2286e161e,Namespace:kube-system,Attempt:0,}" Feb 9 19:15:35.784637 env[1733]: time="2024-02-09T19:15:35.784571368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-196,Uid:a2fda3daed2a249fee0daa7b2365dee0,Namespace:kube-system,Attempt:0,}" Feb 9 19:15:35.856952 kubelet[2412]: I0209 19:15:35.856457 2412 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:35.856952 kubelet[2412]: E0209 19:15:35.856916 2412 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.196:6443/api/v1/nodes\": dial tcp 172.31.23.196:6443: connect: connection refused" node="ip-172-31-23-196" Feb 9 19:15:36.167995 kubelet[2412]: W0209 19:15:36.167933 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.196:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.168295 kubelet[2412]: E0209 19:15:36.168001 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.196:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.206657 kubelet[2412]: W0209 19:15:36.206593 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.196:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.206657 kubelet[2412]: E0209 19:15:36.206658 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.196:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.252192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1195920143.mount: Deactivated successfully. Feb 9 19:15:36.262285 env[1733]: time="2024-02-09T19:15:36.262204627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.267542 env[1733]: time="2024-02-09T19:15:36.267483387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.269524 env[1733]: time="2024-02-09T19:15:36.269456275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.271853 env[1733]: time="2024-02-09T19:15:36.271770254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.275745 env[1733]: time="2024-02-09T19:15:36.275695952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.281120 env[1733]: time="2024-02-09T19:15:36.281069508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.287377 env[1733]: time="2024-02-09T19:15:36.287331520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.289132 env[1733]: time="2024-02-09T19:15:36.289081442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.290583 env[1733]: time="2024-02-09T19:15:36.290536224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.292050 env[1733]: time="2024-02-09T19:15:36.292007711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.298033 env[1733]: time="2024-02-09T19:15:36.297973166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.299495 env[1733]: time="2024-02-09T19:15:36.299431597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:15:36.342893 env[1733]: time="2024-02-09T19:15:36.342749156Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:15:36.343383 env[1733]: time="2024-02-09T19:15:36.342867222Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:15:36.343383 env[1733]: time="2024-02-09T19:15:36.343337120Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:15:36.355972 env[1733]: time="2024-02-09T19:15:36.355849130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4 pid=2488 runtime=io.containerd.runc.v2 Feb 9 19:15:36.359188 env[1733]: time="2024-02-09T19:15:36.359048722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:15:36.359432 env[1733]: time="2024-02-09T19:15:36.359123572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:15:36.360076 env[1733]: time="2024-02-09T19:15:36.359957771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:15:36.363269 env[1733]: time="2024-02-09T19:15:36.363105027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcbd71fb72fd59a493569432a2da0cf9e7fa3849dc085eaa0a233c4d5e032dac pid=2502 runtime=io.containerd.runc.v2 Feb 9 19:15:36.380374 env[1733]: time="2024-02-09T19:15:36.380076418Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:15:36.380374 env[1733]: time="2024-02-09T19:15:36.380166174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:15:36.380374 env[1733]: time="2024-02-09T19:15:36.380192996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:15:36.391369 env[1733]: time="2024-02-09T19:15:36.380755157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e pid=2529 runtime=io.containerd.runc.v2 Feb 9 19:15:36.395557 systemd[1]: Started cri-containerd-89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4.scope. Feb 9 19:15:36.424133 systemd[1]: Started cri-containerd-bcbd71fb72fd59a493569432a2da0cf9e7fa3849dc085eaa0a233c4d5e032dac.scope. Feb 9 19:15:36.458806 systemd[1]: Started cri-containerd-6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e.scope. Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.463000 audit: BPF prog-id=70 op=LOAD Feb 9 19:15:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.467000 audit: BPF prog-id=71 op=LOAD Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2488 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333837373634626431303637613232303638326132313462663831 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2488 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333837373634626431303637613232303638326132313462663831 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit: BPF prog-id=72 op=LOAD Feb 9 19:15:36.468000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2488 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333837373634626431303637613232303638326132313462663831 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit: BPF prog-id=73 op=LOAD Feb 9 19:15:36.468000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2488 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333837373634626431303637613232303638326132313462663831 Feb 9 19:15:36.468000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:15:36.468000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.468000 audit: BPF prog-id=74 op=LOAD Feb 9 19:15:36.468000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2488 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333837373634626431303637613232303638326132313462663831 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2502 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263626437316662373266643539613439333536393433326132646130 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2502 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263626437316662373266643539613439333536393433326132646130 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit: BPF prog-id=75 op=LOAD Feb 9 19:15:36.472000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2502 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263626437316662373266643539613439333536393433326132646130 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit: BPF prog-id=76 op=LOAD Feb 9 19:15:36.472000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2502 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263626437316662373266643539613439333536393433326132646130 Feb 9 19:15:36.472000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:15:36.472000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.472000 audit: BPF prog-id=77 op=LOAD Feb 9 19:15:36.472000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2502 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263626437316662373266643539613439333536393433326132646130 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.509000 audit: BPF prog-id=78 op=LOAD Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2529 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662646333653130666239353036316166323865373063393332616338 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2529 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662646333653130666239353036316166323865373063393332616338 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit: BPF prog-id=79 op=LOAD Feb 9 19:15:36.510000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2529 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662646333653130666239353036316166323865373063393332616338 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.510000 audit: BPF prog-id=80 op=LOAD Feb 9 19:15:36.510000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2529 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662646333653130666239353036316166323865373063393332616338 Feb 9 19:15:36.511000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:15:36.511000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.511000 audit: BPF prog-id=81 op=LOAD Feb 9 19:15:36.511000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2529 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662646333653130666239353036316166323865373063393332616338 Feb 9 19:15:36.549559 kubelet[2412]: E0209 19:15:36.549502 2412 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.553588 env[1733]: time="2024-02-09T19:15:36.553527260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-196,Uid:10f0a357d58351c9b244105b1e275554,Namespace:kube-system,Attempt:0,} returns sandbox id \"bcbd71fb72fd59a493569432a2da0cf9e7fa3849dc085eaa0a233c4d5e032dac\"" Feb 9 19:15:36.583845 env[1733]: time="2024-02-09T19:15:36.582701157Z" level=info msg="CreateContainer within sandbox \"bcbd71fb72fd59a493569432a2da0cf9e7fa3849dc085eaa0a233c4d5e032dac\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:15:36.588213 env[1733]: time="2024-02-09T19:15:36.588145086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-196,Uid:ec85d936214a4a1d75ed93c2286e161e,Namespace:kube-system,Attempt:0,} returns sandbox id \"89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4\"" Feb 9 19:15:36.594928 env[1733]: time="2024-02-09T19:15:36.593861342Z" level=info msg="CreateContainer within sandbox \"89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:15:36.598180 env[1733]: time="2024-02-09T19:15:36.598106710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-196,Uid:a2fda3daed2a249fee0daa7b2365dee0,Namespace:kube-system,Attempt:0,} returns sandbox id \"6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e\"" Feb 9 19:15:36.604686 env[1733]: time="2024-02-09T19:15:36.604587091Z" level=info msg="CreateContainer within sandbox \"6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:15:36.633372 env[1733]: time="2024-02-09T19:15:36.633307255Z" level=info msg="CreateContainer within sandbox \"bcbd71fb72fd59a493569432a2da0cf9e7fa3849dc085eaa0a233c4d5e032dac\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fbde5ec1f09f12852ad459f301d50bce2a4f019dec0b16d67f2b58d15243878e\"" Feb 9 19:15:36.634714 env[1733]: time="2024-02-09T19:15:36.634644428Z" level=info msg="StartContainer for \"fbde5ec1f09f12852ad459f301d50bce2a4f019dec0b16d67f2b58d15243878e\"" Feb 9 19:15:36.650948 env[1733]: time="2024-02-09T19:15:36.650880892Z" level=info msg="CreateContainer within sandbox \"6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f\"" Feb 9 19:15:36.652150 env[1733]: time="2024-02-09T19:15:36.652085154Z" level=info msg="StartContainer for \"d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f\"" Feb 9 19:15:36.654464 env[1733]: time="2024-02-09T19:15:36.654400465Z" level=info msg="CreateContainer within sandbox \"89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e\"" Feb 9 19:15:36.655459 env[1733]: time="2024-02-09T19:15:36.655410887Z" level=info msg="StartContainer for \"dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e\"" Feb 9 19:15:36.664690 kubelet[2412]: W0209 19:15:36.664565 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.196:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-196&limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.664844 kubelet[2412]: E0209 19:15:36.664712 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.196:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-196&limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.666786 kubelet[2412]: I0209 19:15:36.666739 2412 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:36.667501 kubelet[2412]: E0209 19:15:36.667426 2412 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.196:6443/api/v1/nodes\": dial tcp 172.31.23.196:6443: connect: connection refused" node="ip-172-31-23-196" Feb 9 19:15:36.692668 systemd[1]: Started cri-containerd-fbde5ec1f09f12852ad459f301d50bce2a4f019dec0b16d67f2b58d15243878e.scope. Feb 9 19:15:36.719675 systemd[1]: Started cri-containerd-d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f.scope. Feb 9 19:15:36.732913 systemd[1]: Started cri-containerd-dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e.scope. Feb 9 19:15:36.740049 kubelet[2412]: W0209 19:15:36.739850 2412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.196:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.740197 kubelet[2412]: E0209 19:15:36.740076 2412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.196:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.196:6443: connect: connection refused Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.769000 audit: BPF prog-id=82 op=LOAD Feb 9 19:15:36.770000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.770000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2502 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646535656331663039663132383532616434353966333031643530 Feb 9 19:15:36.770000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.770000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2502 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646535656331663039663132383532616434353966333031643530 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.771000 audit: BPF prog-id=83 op=LOAD Feb 9 19:15:36.771000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2502 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646535656331663039663132383532616434353966333031643530 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.772000 audit: BPF prog-id=84 op=LOAD Feb 9 19:15:36.772000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2502 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646535656331663039663132383532616434353966333031643530 Feb 9 19:15:36.774000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:15:36.774000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { perfmon } for pid=2614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit[2614]: AVC avc: denied { bpf } for pid=2614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.774000 audit: BPF prog-id=85 op=LOAD Feb 9 19:15:36.774000 audit[2614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2502 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646535656331663039663132383532616434353966333031643530 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.783000 audit: BPF prog-id=86 op=LOAD Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2488 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643866306238303561663238393064636239653565623036306434 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2488 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643866306238303561663238393064636239653565623036306434 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit: BPF prog-id=87 op=LOAD Feb 9 19:15:36.784000 audit[2639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2488 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643866306238303561663238393064636239653565623036306434 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.784000 audit: BPF prog-id=88 op=LOAD Feb 9 19:15:36.784000 audit[2639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2488 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643866306238303561663238393064636239653565623036306434 Feb 9 19:15:36.785000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:15:36.785000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.785000 audit: BPF prog-id=89 op=LOAD Feb 9 19:15:36.785000 audit[2639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2488 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643866306238303561663238393064636239653565623036306434 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.803000 audit: BPF prog-id=90 op=LOAD Feb 9 19:15:36.804000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.804000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2529 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393039326530353533343731393663346332633266393132646335 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2529 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393039326530353533343731393663346332633266393132646335 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.805000 audit: BPF prog-id=91 op=LOAD Feb 9 19:15:36.805000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2529 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393039326530353533343731393663346332633266393132646335 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.807000 audit: BPF prog-id=92 op=LOAD Feb 9 19:15:36.807000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2529 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393039326530353533343731393663346332633266393132646335 Feb 9 19:15:36.811000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:15:36.812000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:36.812000 audit: BPF prog-id=93 op=LOAD Feb 9 19:15:36.812000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2529 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:36.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393039326530353533343731393663346332633266393132646335 Feb 9 19:15:36.863291 env[1733]: time="2024-02-09T19:15:36.862236134Z" level=info msg="StartContainer for \"dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e\" returns successfully" Feb 9 19:15:36.868045 env[1733]: time="2024-02-09T19:15:36.867962603Z" level=info msg="StartContainer for \"fbde5ec1f09f12852ad459f301d50bce2a4f019dec0b16d67f2b58d15243878e\" returns successfully" Feb 9 19:15:36.916375 env[1733]: time="2024-02-09T19:15:36.916236348Z" level=info msg="StartContainer for \"d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f\" returns successfully" Feb 9 19:15:38.269896 kubelet[2412]: I0209 19:15:38.269849 2412 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:40.467105 update_engine[1724]: I0209 19:15:40.466311 1724 update_attempter.cc:509] Updating boot flags... Feb 9 19:15:40.853901 kernel: kauditd_printk_skb: 660 callbacks suppressed Feb 9 19:15:40.854154 kernel: audit: type=1400 audit(1707506140.836:726): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.836000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.873447 kernel: audit: type=1300 audit(1707506140.836:726): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4004934180 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.836000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4004934180 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.892228 kernel: audit: type=1327 audit(1707506140.836:726): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:40.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:40.907651 kernel: audit: type=1400 audit(1707506140.836:727): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.836000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.836000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40049342a0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.919765 kernel: audit: type=1300 audit(1707506140.836:727): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40049342a0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.937271 kernel: audit: type=1327 audit(1707506140.836:727): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:40.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:40.953964 kernel: audit: type=1400 audit(1707506140.844:728): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.844000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.977166 kernel: audit: type=1300 audit(1707506140.844:728): arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=4004934f30 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.844000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=4004934f30 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.994321 kernel: audit: type=1327 audit(1707506140.844:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:40.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:41.006330 kernel: audit: type=1400 audit(1707506140.856:729): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.856000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:40.856000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=40042bdba0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:40.856000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:41.117920 kubelet[2412]: I0209 19:15:41.117780 2412 apiserver.go:52] "Watching apiserver" Feb 9 19:15:41.124000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:41.124000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=4001937d80 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:41.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:41.124000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:41.124000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=4004ab4480 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:15:41.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:15:41.337599 kubelet[2412]: I0209 19:15:41.337516 2412 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:15:41.384933 kubelet[2412]: I0209 19:15:41.384803 2412 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:15:41.419880 kubelet[2412]: E0209 19:15:41.419795 2412 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-23-196\" not found" node="ip-172-31-23-196" Feb 9 19:15:41.488665 kubelet[2412]: I0209 19:15:41.488622 2412 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-196" Feb 9 19:15:41.518047 kubelet[2412]: E0209 19:15:41.517891 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c87b92d5f3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 119091187, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 119091187, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.590848 kubelet[2412]: E0209 19:15:41.590661 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c87cc0a7ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 138871278, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 138871278, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.648352 kubelet[2412]: E0209 19:15:41.648130 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c880143229", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-196 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194677801, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194677801, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.707041 kubelet[2412]: E0209 19:15:41.706916 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c88014afb4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-196 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194709940, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194709940, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.769485 kubelet[2412]: E0209 19:15:41.769363 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c88014c634", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-23-196 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194715700, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194715700, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.835751 kubelet[2412]: E0209 19:15:41.835557 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c880143229", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-196 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194677801, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 242728564, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.902823 kubelet[2412]: E0209 19:15:41.902584 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c88014afb4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-196 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194709940, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 242737193, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:41.980839 kubelet[2412]: E0209 19:15:41.980664 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c88014c634", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-23-196 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194715700, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 242742510, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:42.038779 kubelet[2412]: E0209 19:15:42.038645 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c8836ee8a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 250954404, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 250954404, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:42.184163 kubelet[2412]: E0209 19:15:42.183999 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c880143229", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-196 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194677801, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 432434121, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:42.432000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:42.432000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40003b3cb0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:42.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:42.434000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:42.434000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001152e40 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:42.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:42.578606 kubelet[2412]: E0209 19:15:42.578475 2412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-196.17b247c88014afb4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-196", UID:"ip-172-31-23-196", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-196 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-196"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 194709940, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 15, 35, 432459132, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:15:44.072763 systemd[1]: Reloading. Feb 9 19:15:44.273545 /usr/lib/systemd/system-generators/torcx-generator[2917]: time="2024-02-09T19:15:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:15:44.274132 /usr/lib/systemd/system-generators/torcx-generator[2917]: time="2024-02-09T19:15:44Z" level=info msg="torcx already run" Feb 9 19:15:44.489828 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:15:44.490088 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:15:44.545541 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:15:44.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.747000 audit: BPF prog-id=94 op=LOAD Feb 9 19:15:44.748000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.750000 audit: BPF prog-id=95 op=LOAD Feb 9 19:15:44.750000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit: BPF prog-id=96 op=LOAD Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.753000 audit: BPF prog-id=97 op=LOAD Feb 9 19:15:44.753000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:15:44.753000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:15:44.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.757000 audit: BPF prog-id=98 op=LOAD Feb 9 19:15:44.757000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.759000 audit: BPF prog-id=99 op=LOAD Feb 9 19:15:44.759000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.766000 audit: BPF prog-id=100 op=LOAD Feb 9 19:15:44.766000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:15:44.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.768000 audit: BPF prog-id=101 op=LOAD Feb 9 19:15:44.769000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:15:44.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.772000 audit: BPF prog-id=102 op=LOAD Feb 9 19:15:44.772000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:15:44.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit: BPF prog-id=103 op=LOAD Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.774000 audit: BPF prog-id=104 op=LOAD Feb 9 19:15:44.774000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:15:44.774000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:15:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.778000 audit: BPF prog-id=105 op=LOAD Feb 9 19:15:44.778000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:15:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.780000 audit: BPF prog-id=106 op=LOAD Feb 9 19:15:44.780000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:15:44.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.783000 audit: BPF prog-id=107 op=LOAD Feb 9 19:15:44.783000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.787000 audit: BPF prog-id=108 op=LOAD Feb 9 19:15:44.787000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:15:44.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit: BPF prog-id=109 op=LOAD Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.794000 audit: BPF prog-id=110 op=LOAD Feb 9 19:15:44.794000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:15:44.794000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:15:44.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit: BPF prog-id=111 op=LOAD Feb 9 19:15:44.799000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit: BPF prog-id=112 op=LOAD Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.801000 audit: BPF prog-id=113 op=LOAD Feb 9 19:15:44.801000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:15:44.801000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:15:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:44.805000 audit: BPF prog-id=114 op=LOAD Feb 9 19:15:44.805000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:15:44.858983 systemd[1]: Stopping kubelet.service... Feb 9 19:15:44.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:44.874590 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:15:44.875026 systemd[1]: Stopped kubelet.service. Feb 9 19:15:44.875129 systemd[1]: kubelet.service: Consumed 1.426s CPU time. Feb 9 19:15:44.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:44.883449 systemd[1]: Started kubelet.service. Feb 9 19:15:45.044300 kubelet[2973]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:15:45.044300 kubelet[2973]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:15:45.044300 kubelet[2973]: I0209 19:15:45.038548 2973 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:15:45.044300 kubelet[2973]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:15:45.044300 kubelet[2973]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:15:45.049526 kubelet[2973]: I0209 19:15:45.049471 2973 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:15:45.049526 kubelet[2973]: I0209 19:15:45.049514 2973 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:15:45.049943 kubelet[2973]: I0209 19:15:45.049868 2973 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:15:45.052753 kubelet[2973]: I0209 19:15:45.052690 2973 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:15:45.058283 kubelet[2973]: W0209 19:15:45.058108 2973 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 19:15:45.059584 kubelet[2973]: I0209 19:15:45.059527 2973 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:15:45.060008 kubelet[2973]: I0209 19:15:45.059945 2973 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:15:45.060610 kubelet[2973]: I0209 19:15:45.060308 2973 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:15:45.061470 kubelet[2973]: I0209 19:15:45.061426 2973 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:15:45.061666 kubelet[2973]: I0209 19:15:45.061515 2973 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:15:45.061666 kubelet[2973]: I0209 19:15:45.061577 2973 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:15:45.061781 kubelet[2973]: I0209 19:15:45.061678 2973 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:15:45.074291 kubelet[2973]: I0209 19:15:45.071108 2973 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:15:45.074291 kubelet[2973]: I0209 19:15:45.071154 2973 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:15:45.074291 kubelet[2973]: I0209 19:15:45.071206 2973 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:15:45.074291 kubelet[2973]: I0209 19:15:45.071229 2973 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:15:45.084462 kubelet[2973]: I0209 19:15:45.084411 2973 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:15:45.085150 kubelet[2973]: I0209 19:15:45.085096 2973 server.go:1186] "Started kubelet" Feb 9 19:15:45.088400 kubelet[2973]: I0209 19:15:45.088354 2973 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:15:45.089371 kubelet[2973]: I0209 19:15:45.089333 2973 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:15:45.089000 audit[2973]: AVC avc: denied { mac_admin } for pid=2973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:45.089000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:45.089000 audit[2973]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009756b0 a1=4000059d10 a2=4000975680 a3=25 items=0 ppid=1 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:45.089000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:45.089000 audit[2973]: AVC avc: denied { mac_admin } for pid=2973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:45.089000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:45.089000 audit[2973]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007077a0 a1=4000059d28 a2=4000975740 a3=25 items=0 ppid=1 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:45.089000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:45.094997 kubelet[2973]: I0209 19:15:45.090821 2973 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:15:45.094997 kubelet[2973]: I0209 19:15:45.092920 2973 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:15:45.094997 kubelet[2973]: I0209 19:15:45.092977 2973 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:15:45.103236 kubelet[2973]: I0209 19:15:45.103181 2973 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:15:45.103931 kubelet[2973]: I0209 19:15:45.103873 2973 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:15:45.106118 kubelet[2973]: E0209 19:15:45.106068 2973 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:15:45.106118 kubelet[2973]: E0209 19:15:45.106120 2973 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:15:45.247434 kubelet[2973]: I0209 19:15:45.247331 2973 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-196" Feb 9 19:15:45.327590 kubelet[2973]: I0209 19:15:45.327439 2973 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:15:45.346683 kubelet[2973]: I0209 19:15:45.346628 2973 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-23-196" Feb 9 19:15:45.346832 kubelet[2973]: I0209 19:15:45.346744 2973 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-196" Feb 9 19:15:45.405649 kubelet[2973]: I0209 19:15:45.405599 2973 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:15:45.405649 kubelet[2973]: I0209 19:15:45.405640 2973 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:15:45.405880 kubelet[2973]: I0209 19:15:45.405678 2973 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:15:45.405941 kubelet[2973]: I0209 19:15:45.405912 2973 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:15:45.405941 kubelet[2973]: I0209 19:15:45.405936 2973 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:15:45.406073 kubelet[2973]: I0209 19:15:45.405952 2973 policy_none.go:49] "None policy: Start" Feb 9 19:15:45.407307 kubelet[2973]: I0209 19:15:45.407243 2973 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:15:45.407442 kubelet[2973]: I0209 19:15:45.407313 2973 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:15:45.407573 kubelet[2973]: I0209 19:15:45.407538 2973 state_mem.go:75] "Updated machine memory state" Feb 9 19:15:45.422735 kubelet[2973]: I0209 19:15:45.422700 2973 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:15:45.424040 kubelet[2973]: I0209 19:15:45.423990 2973 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:15:45.422000 audit[2973]: AVC avc: denied { mac_admin } for pid=2973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:45.422000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:15:45.422000 audit[2973]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40012ed0b0 a1=4001168fc0 a2=40012ed080 a3=25 items=0 ppid=1 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:45.422000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:15:45.427846 kubelet[2973]: I0209 19:15:45.427811 2973 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:15:45.474369 kubelet[2973]: I0209 19:15:45.474314 2973 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:15:45.474369 kubelet[2973]: I0209 19:15:45.474365 2973 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:15:45.474580 kubelet[2973]: I0209 19:15:45.474398 2973 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:15:45.474580 kubelet[2973]: E0209 19:15:45.474488 2973 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:15:45.575312 kubelet[2973]: I0209 19:15:45.575230 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:45.575471 kubelet[2973]: I0209 19:15:45.575371 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:45.575471 kubelet[2973]: I0209 19:15:45.575441 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:45.615433 kubelet[2973]: I0209 19:15:45.615297 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:45.615433 kubelet[2973]: I0209 19:15:45.615372 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:45.615433 kubelet[2973]: I0209 19:15:45.615424 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:45.615702 kubelet[2973]: I0209 19:15:45.615481 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2fda3daed2a249fee0daa7b2365dee0-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-196\" (UID: \"a2fda3daed2a249fee0daa7b2365dee0\") " pod="kube-system/kube-scheduler-ip-172-31-23-196" Feb 9 19:15:45.615702 kubelet[2973]: I0209 19:15:45.615577 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-ca-certs\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:45.615702 kubelet[2973]: I0209 19:15:45.615626 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/10f0a357d58351c9b244105b1e275554-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-196\" (UID: \"10f0a357d58351c9b244105b1e275554\") " pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:45.615900 kubelet[2973]: I0209 19:15:45.615707 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:45.615900 kubelet[2973]: I0209 19:15:45.615787 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:45.615900 kubelet[2973]: I0209 19:15:45.615849 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec85d936214a4a1d75ed93c2286e161e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-196\" (UID: \"ec85d936214a4a1d75ed93c2286e161e\") " pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:46.082800 kubelet[2973]: I0209 19:15:46.082708 2973 apiserver.go:52] "Watching apiserver" Feb 9 19:15:46.104550 kubelet[2973]: I0209 19:15:46.104495 2973 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:15:46.119060 kubelet[2973]: I0209 19:15:46.119005 2973 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:15:46.531291 kubelet[2973]: E0209 19:15:46.531221 2973 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-23-196\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-23-196" Feb 9 19:15:46.533001 kubelet[2973]: E0209 19:15:46.532944 2973 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-23-196\" already exists" pod="kube-system/kube-scheduler-ip-172-31-23-196" Feb 9 19:15:46.704949 kubelet[2973]: E0209 19:15:46.704873 2973 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-23-196\" already exists" pod="kube-system/kube-apiserver-ip-172-31-23-196" Feb 9 19:15:47.511001 kubelet[2973]: I0209 19:15:47.510937 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-23-196" podStartSLOduration=2.5108562770000002 pod.CreationTimestamp="2024-02-09 19:15:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:15:47.510767557 +0000 UTC m=+2.619375299" watchObservedRunningTime="2024-02-09 19:15:47.510856277 +0000 UTC m=+2.619464007" Feb 9 19:15:47.511632 kubelet[2973]: I0209 19:15:47.511128 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-23-196" podStartSLOduration=2.5110683270000003 pod.CreationTimestamp="2024-02-09 19:15:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:15:47.227569364 +0000 UTC m=+2.336177118" watchObservedRunningTime="2024-02-09 19:15:47.511068327 +0000 UTC m=+2.619676069" Feb 9 19:15:50.326185 kubelet[2973]: I0209 19:15:50.326127 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-23-196" podStartSLOduration=5.326047139 pod.CreationTimestamp="2024-02-09 19:15:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:15:47.913476341 +0000 UTC m=+3.022084071" watchObservedRunningTime="2024-02-09 19:15:50.326047139 +0000 UTC m=+5.434654857" Feb 9 19:15:52.240561 sudo[2007]: pam_unix(sudo:session): session closed for user root Feb 9 19:15:52.240000 audit[2007]: USER_END pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.242631 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 19:15:52.243554 kernel: audit: type=1106 audit(1707506152.240:983): pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.242000 audit[2007]: CRED_DISP pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.259923 kernel: audit: type=1104 audit(1707506152.242:984): pid=2007 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.273505 sshd[2004]: pam_unix(sshd:session): session closed for user core Feb 9 19:15:52.275000 audit[2004]: USER_END pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:52.288376 systemd[1]: sshd@6-172.31.23.196:22-147.75.109.163:49712.service: Deactivated successfully. Feb 9 19:15:52.289757 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:15:52.290138 systemd[1]: session-7.scope: Consumed 9.588s CPU time. Feb 9 19:15:52.275000 audit[2004]: CRED_DISP pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:52.299812 kernel: audit: type=1106 audit(1707506152.275:985): pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:52.299968 kernel: audit: type=1104 audit(1707506152.275:986): pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:15:52.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.196:22-147.75.109.163:49712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.300359 systemd-logind[1721]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:15:52.308696 kernel: audit: type=1131 audit(1707506152.288:987): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.196:22-147.75.109.163:49712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:52.310195 systemd-logind[1721]: Removed session 7. Feb 9 19:15:58.481000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:15:58.481000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c99e40 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.507333 kernel: audit: type=1400 audit(1707506158.481:988): avc: denied { watch } for pid=2671 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:15:58.507464 kernel: audit: type=1300 audit(1707506158.481:988): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c99e40 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.481000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.519165 kernel: audit: type=1327 audit(1707506158.481:988): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.556000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.556000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f360a0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.579424 kernel: audit: type=1400 audit(1707506158.556:989): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.579600 kernel: audit: type=1300 audit(1707506158.556:989): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f360a0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.556000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.556000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.600313 kernel: audit: type=1327 audit(1707506158.556:989): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.600471 kernel: audit: type=1400 audit(1707506158.556:990): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.556000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f361e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.612688 kernel: audit: type=1300 audit(1707506158.556:990): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f361e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.612865 kernel: audit: type=1327 audit(1707506158.556:990): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.556000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.562000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.632813 kernel: audit: type=1400 audit(1707506158.562:991): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.562000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000f36340 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.562000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:58.562000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:15:58.562000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f364e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:15:58.562000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:15:59.036278 kubelet[2973]: I0209 19:15:59.036229 2973 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:15:59.037176 env[1733]: time="2024-02-09T19:15:59.037103009Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:15:59.038336 kubelet[2973]: I0209 19:15:59.038008 2973 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:15:59.396867 kubelet[2973]: I0209 19:15:59.396705 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:59.408586 systemd[1]: Created slice kubepods-besteffort-pod1e4fb79d_0609_4980_9235_f0cc242efea8.slice. Feb 9 19:15:59.504363 kubelet[2973]: I0209 19:15:59.504311 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e4fb79d-0609-4980-9235-f0cc242efea8-var-lib-calico\") pod \"tigera-operator-cfc98749c-2mm4k\" (UID: \"1e4fb79d-0609-4980-9235-f0cc242efea8\") " pod="tigera-operator/tigera-operator-cfc98749c-2mm4k" Feb 9 19:15:59.504647 kubelet[2973]: I0209 19:15:59.504605 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcsf5\" (UniqueName: \"kubernetes.io/projected/1e4fb79d-0609-4980-9235-f0cc242efea8-kube-api-access-qcsf5\") pod \"tigera-operator-cfc98749c-2mm4k\" (UID: \"1e4fb79d-0609-4980-9235-f0cc242efea8\") " pod="tigera-operator/tigera-operator-cfc98749c-2mm4k" Feb 9 19:15:59.543097 kubelet[2973]: I0209 19:15:59.543035 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:15:59.553866 systemd[1]: Created slice kubepods-besteffort-podaae5efff_f820_4a91_9f79_8b33212665e5.slice. Feb 9 19:15:59.580068 kubelet[2973]: W0209 19:15:59.580015 2973 reflector.go:424] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:15:59.580068 kubelet[2973]: E0209 19:15:59.580074 2973 reflector.go:140] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:15:59.580364 kubelet[2973]: W0209 19:15:59.580244 2973 reflector.go:424] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:15:59.580364 kubelet[2973]: E0209 19:15:59.580291 2973 reflector.go:140] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:15:59.605342 kubelet[2973]: I0209 19:15:59.605276 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aae5efff-f820-4a91-9f79-8b33212665e5-xtables-lock\") pod \"kube-proxy-g4q86\" (UID: \"aae5efff-f820-4a91-9f79-8b33212665e5\") " pod="kube-system/kube-proxy-g4q86" Feb 9 19:15:59.605524 kubelet[2973]: I0209 19:15:59.605357 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bclfx\" (UniqueName: \"kubernetes.io/projected/aae5efff-f820-4a91-9f79-8b33212665e5-kube-api-access-bclfx\") pod \"kube-proxy-g4q86\" (UID: \"aae5efff-f820-4a91-9f79-8b33212665e5\") " pod="kube-system/kube-proxy-g4q86" Feb 9 19:15:59.605524 kubelet[2973]: I0209 19:15:59.605490 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/aae5efff-f820-4a91-9f79-8b33212665e5-kube-proxy\") pod \"kube-proxy-g4q86\" (UID: \"aae5efff-f820-4a91-9f79-8b33212665e5\") " pod="kube-system/kube-proxy-g4q86" Feb 9 19:15:59.605755 kubelet[2973]: I0209 19:15:59.605538 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aae5efff-f820-4a91-9f79-8b33212665e5-lib-modules\") pod \"kube-proxy-g4q86\" (UID: \"aae5efff-f820-4a91-9f79-8b33212665e5\") " pod="kube-system/kube-proxy-g4q86" Feb 9 19:15:59.722498 env[1733]: time="2024-02-09T19:15:59.722408687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-2mm4k,Uid:1e4fb79d-0609-4980-9235-f0cc242efea8,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:15:59.759224 env[1733]: time="2024-02-09T19:15:59.758857782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:15:59.759224 env[1733]: time="2024-02-09T19:15:59.758936409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:15:59.759224 env[1733]: time="2024-02-09T19:15:59.758961549Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:15:59.759546 env[1733]: time="2024-02-09T19:15:59.759361293Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80 pid=3080 runtime=io.containerd.runc.v2 Feb 9 19:15:59.797113 systemd[1]: Started cri-containerd-223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80.scope. Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.823000 audit: BPF prog-id=115 op=LOAD Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3080 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232336561636335643834313435653866303466623761386631373039 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3080 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232336561636335643834313435653866303466623761386631373039 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit: BPF prog-id=116 op=LOAD Feb 9 19:15:59.824000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3080 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232336561636335643834313435653866303466623761386631373039 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit: BPF prog-id=117 op=LOAD Feb 9 19:15:59.824000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3080 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232336561636335643834313435653866303466623761386631373039 Feb 9 19:15:59.824000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:15:59.824000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:15:59.824000 audit: BPF prog-id=118 op=LOAD Feb 9 19:15:59.824000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3080 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:15:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232336561636335643834313435653866303466623761386631373039 Feb 9 19:15:59.877330 env[1733]: time="2024-02-09T19:15:59.876960565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-2mm4k,Uid:1e4fb79d-0609-4980-9235-f0cc242efea8,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80\"" Feb 9 19:15:59.883029 env[1733]: time="2024-02-09T19:15:59.882037317Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:16:00.706552 kubelet[2973]: E0209 19:16:00.706519 2973 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:16:00.707276 kubelet[2973]: E0209 19:16:00.707223 2973 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/aae5efff-f820-4a91-9f79-8b33212665e5-kube-proxy podName:aae5efff-f820-4a91-9f79-8b33212665e5 nodeName:}" failed. No retries permitted until 2024-02-09 19:16:01.207188123 +0000 UTC m=+16.315795829 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/aae5efff-f820-4a91-9f79-8b33212665e5-kube-proxy") pod "kube-proxy-g4q86" (UID: "aae5efff-f820-4a91-9f79-8b33212665e5") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:16:00.720849 kubelet[2973]: E0209 19:16:00.720752 2973 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:16:00.720849 kubelet[2973]: E0209 19:16:00.720846 2973 projected.go:198] Error preparing data for projected volume kube-api-access-bclfx for pod kube-system/kube-proxy-g4q86: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:16:00.721083 kubelet[2973]: E0209 19:16:00.720960 2973 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/aae5efff-f820-4a91-9f79-8b33212665e5-kube-api-access-bclfx podName:aae5efff-f820-4a91-9f79-8b33212665e5 nodeName:}" failed. No retries permitted until 2024-02-09 19:16:01.220932336 +0000 UTC m=+16.329540042 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-bclfx" (UniqueName: "kubernetes.io/projected/aae5efff-f820-4a91-9f79-8b33212665e5-kube-api-access-bclfx") pod "kube-proxy-g4q86" (UID: "aae5efff-f820-4a91-9f79-8b33212665e5") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:16:01.234243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1963266939.mount: Deactivated successfully. Feb 9 19:16:01.370069 env[1733]: time="2024-02-09T19:16:01.369351425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g4q86,Uid:aae5efff-f820-4a91-9f79-8b33212665e5,Namespace:kube-system,Attempt:0,}" Feb 9 19:16:01.428009 env[1733]: time="2024-02-09T19:16:01.427898893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:01.428301 env[1733]: time="2024-02-09T19:16:01.427974135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:01.428301 env[1733]: time="2024-02-09T19:16:01.428001412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:01.428557 env[1733]: time="2024-02-09T19:16:01.428319853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3239b75814c044bc343c8fb2c326928856e2107b6483b078ecc36b58ea6322ec pid=3121 runtime=io.containerd.runc.v2 Feb 9 19:16:01.478630 systemd[1]: Started cri-containerd-3239b75814c044bc343c8fb2c326928856e2107b6483b078ecc36b58ea6322ec.scope. Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.522000 audit: BPF prog-id=119 op=LOAD Feb 9 19:16:01.524000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.524000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001cfb38 a2=10 a3=0 items=0 ppid=3121 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333962373538313463303434626333343363386662326333323639 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001cf5a0 a2=3c a3=0 items=0 ppid=3121 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333962373538313463303434626333343363386662326333323639 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.525000 audit: BPF prog-id=120 op=LOAD Feb 9 19:16:01.525000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cf8e0 a2=78 a3=0 items=0 ppid=3121 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333962373538313463303434626333343363386662326333323639 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.528000 audit: BPF prog-id=121 op=LOAD Feb 9 19:16:01.528000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001cf670 a2=78 a3=0 items=0 ppid=3121 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333962373538313463303434626333343363386662326333323639 Feb 9 19:16:01.529000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:16:01.529000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.529000 audit: BPF prog-id=122 op=LOAD Feb 9 19:16:01.529000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cfb40 a2=78 a3=0 items=0 ppid=3121 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333962373538313463303434626333343363386662326333323639 Feb 9 19:16:01.567962 env[1733]: time="2024-02-09T19:16:01.567872913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g4q86,Uid:aae5efff-f820-4a91-9f79-8b33212665e5,Namespace:kube-system,Attempt:0,} returns sandbox id \"3239b75814c044bc343c8fb2c326928856e2107b6483b078ecc36b58ea6322ec\"" Feb 9 19:16:01.575588 env[1733]: time="2024-02-09T19:16:01.575532200Z" level=info msg="CreateContainer within sandbox \"3239b75814c044bc343c8fb2c326928856e2107b6483b078ecc36b58ea6322ec\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:16:01.623465 env[1733]: time="2024-02-09T19:16:01.623392697Z" level=info msg="CreateContainer within sandbox \"3239b75814c044bc343c8fb2c326928856e2107b6483b078ecc36b58ea6322ec\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"566455a53da273497297cd4366d4d69bbbb8e3e8514900b640866845c40722a6\"" Feb 9 19:16:01.625023 env[1733]: time="2024-02-09T19:16:01.624949176Z" level=info msg="StartContainer for \"566455a53da273497297cd4366d4d69bbbb8e3e8514900b640866845c40722a6\"" Feb 9 19:16:01.679944 systemd[1]: Started cri-containerd-566455a53da273497297cd4366d4d69bbbb8e3e8514900b640866845c40722a6.scope. Feb 9 19:16:01.720000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.720000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3121 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363435356135336461323733343937323937636434333636643464 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.721000 audit: BPF prog-id=123 op=LOAD Feb 9 19:16:01.721000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3121 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363435356135336461323733343937323937636434333636643464 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.722000 audit: BPF prog-id=124 op=LOAD Feb 9 19:16:01.722000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3121 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363435356135336461323733343937323937636434333636643464 Feb 9 19:16:01.724000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:16:01.724000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:01.724000 audit: BPF prog-id=125 op=LOAD Feb 9 19:16:01.724000 audit[3161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3121 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363435356135336461323733343937323937636434333636643464 Feb 9 19:16:01.763981 env[1733]: time="2024-02-09T19:16:01.763905244Z" level=info msg="StartContainer for \"566455a53da273497297cd4366d4d69bbbb8e3e8514900b640866845c40722a6\" returns successfully" Feb 9 19:16:01.942000 audit[3211]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:01.942000 audit[3211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff08efa00 a2=0 a3=ffffa21d56c0 items=0 ppid=3172 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:16:01.945000 audit[3212]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:01.945000 audit[3212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0179490 a2=0 a3=ffff8aa826c0 items=0 ppid=3172 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:16:01.947000 audit[3213]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:01.947000 audit[3213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcfdf0c0 a2=0 a3=ffffbcc056c0 items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:16:01.949000 audit[3214]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:01.949000 audit[3214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffaf47bf0 a2=0 a3=ffff99d3a6c0 items=0 ppid=3172 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:16:01.959000 audit[3215]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=3215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:01.959000 audit[3215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdfa6a910 a2=0 a3=ffff888796c0 items=0 ppid=3172 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:16:01.960000 audit[3216]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:01.960000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb657c20 a2=0 a3=ffffa24e96c0 items=0 ppid=3172 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:01.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:16:02.024000 audit[3217]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.024000 audit[3217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc75e7a10 a2=0 a3=ffff8ee566c0 items=0 ppid=3172 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:16:02.031000 audit[3219]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.031000 audit[3219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdd6914a0 a2=0 a3=ffff93c7a6c0 items=0 ppid=3172 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:16:02.039000 audit[3222]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.039000 audit[3222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe34b06d0 a2=0 a3=ffff902b16c0 items=0 ppid=3172 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:16:02.042000 audit[3223]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.042000 audit[3223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf8f4f20 a2=0 a3=ffff8705f6c0 items=0 ppid=3172 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:16:02.049000 audit[3225]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.049000 audit[3225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdecb4260 a2=0 a3=ffff9f3f06c0 items=0 ppid=3172 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:16:02.052000 audit[3226]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.052000 audit[3226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff084a80 a2=0 a3=ffff9f6ba6c0 items=0 ppid=3172 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:16:02.058000 audit[3228]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.058000 audit[3228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa02dba0 a2=0 a3=ffffab9c56c0 items=0 ppid=3172 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:16:02.066000 audit[3231]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.066000 audit[3231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc297a540 a2=0 a3=ffffa17056c0 items=0 ppid=3172 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:16:02.069000 audit[3232]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.069000 audit[3232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc418a7a0 a2=0 a3=ffff97cf56c0 items=0 ppid=3172 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:16:02.078000 audit[3234]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.078000 audit[3234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc11fa340 a2=0 a3=ffff93eba6c0 items=0 ppid=3172 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:16:02.081000 audit[3235]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.081000 audit[3235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0f95a60 a2=0 a3=ffffb9d046c0 items=0 ppid=3172 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:16:02.087000 audit[3237]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.087000 audit[3237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6560d70 a2=0 a3=ffff97c136c0 items=0 ppid=3172 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:16:02.094000 audit[3240]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.094000 audit[3240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcd7e15a0 a2=0 a3=ffffb531f6c0 items=0 ppid=3172 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:16:02.103000 audit[3243]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.103000 audit[3243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd035b70 a2=0 a3=ffff88a736c0 items=0 ppid=3172 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:16:02.105000 audit[3244]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.105000 audit[3244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffc578b20 a2=0 a3=ffff8460e6c0 items=0 ppid=3172 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:16:02.111000 audit[3246]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.111000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff648e1d0 a2=0 a3=ffff961016c0 items=0 ppid=3172 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:16:02.119000 audit[3249]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:02.119000 audit[3249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf025140 a2=0 a3=ffff8e4446c0 items=0 ppid=3172 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:16:02.150000 audit[3253]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:02.150000 audit[3253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffe0a2ec50 a2=0 a3=ffff8c0036c0 items=0 ppid=3172 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:02.162000 audit[3253]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:02.162000 audit[3253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe0a2ec50 a2=0 a3=ffff8c0036c0 items=0 ppid=3172 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:02.169000 audit[3258]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.169000 audit[3258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd1a2b340 a2=0 a3=ffff86d746c0 items=0 ppid=3172 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:16:02.178000 audit[3260]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.178000 audit[3260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd1b4360 a2=0 a3=ffff8d1e96c0 items=0 ppid=3172 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:16:02.188000 audit[3263]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.188000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0702a40 a2=0 a3=ffffbf0a06c0 items=0 ppid=3172 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:16:02.191000 audit[3264]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.191000 audit[3264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc97f04c0 a2=0 a3=ffffa1a3c6c0 items=0 ppid=3172 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:16:02.199000 audit[3266]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.199000 audit[3266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdaf259f0 a2=0 a3=ffffaebd36c0 items=0 ppid=3172 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:16:02.207000 audit[3267]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.207000 audit[3267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdabff930 a2=0 a3=ffffb9b446c0 items=0 ppid=3172 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:16:02.212000 audit[3269]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.212000 audit[3269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffed49af40 a2=0 a3=ffffa3a966c0 items=0 ppid=3172 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:16:02.222000 audit[3272]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.222000 audit[3272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffee6aef30 a2=0 a3=ffffb46b86c0 items=0 ppid=3172 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:16:02.225000 audit[3273]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.225000 audit[3273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0fc7f80 a2=0 a3=ffff91f926c0 items=0 ppid=3172 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:16:02.230000 audit[3275]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.230000 audit[3275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffecd15170 a2=0 a3=ffffb44da6c0 items=0 ppid=3172 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:16:02.232000 audit[3276]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.232000 audit[3276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe7c21c0 a2=0 a3=ffffa6ed86c0 items=0 ppid=3172 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:16:02.237000 audit[3278]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.237000 audit[3278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff17b270 a2=0 a3=ffffbe4566c0 items=0 ppid=3172 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:16:02.247000 audit[3281]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.247000 audit[3281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffecabb160 a2=0 a3=ffff826f86c0 items=0 ppid=3172 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:16:02.254000 audit[3284]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.254000 audit[3284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf12c690 a2=0 a3=ffffb80df6c0 items=0 ppid=3172 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:16:02.256000 audit[3285]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.256000 audit[3285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe7a7d360 a2=0 a3=ffff8d2b46c0 items=0 ppid=3172 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:16:02.261000 audit[3287]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.261000 audit[3287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffeea120f0 a2=0 a3=ffffbcbed6c0 items=0 ppid=3172 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:16:02.269000 audit[3290]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:16:02.269000 audit[3290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef011d30 a2=0 a3=ffffac6306c0 items=0 ppid=3172 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:16:02.282000 audit[3294]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:16:02.282000 audit[3294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffcd732840 a2=0 a3=ffffb32426c0 items=0 ppid=3172 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.282000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:02.283000 audit[3294]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:16:02.283000 audit[3294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffcd732840 a2=0 a3=ffffb32426c0 items=0 ppid=3172 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.283000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:02.545507 env[1733]: time="2024-02-09T19:16:02.545347364Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:02.552924 kubelet[2973]: I0209 19:16:02.552566 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-g4q86" podStartSLOduration=3.552489538 pod.CreationTimestamp="2024-02-09 19:15:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:02.551948215 +0000 UTC m=+17.660555933" watchObservedRunningTime="2024-02-09 19:16:02.552489538 +0000 UTC m=+17.661097268" Feb 9 19:16:02.556312 env[1733]: time="2024-02-09T19:16:02.556150213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:02.560831 env[1733]: time="2024-02-09T19:16:02.560767675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:02.564142 env[1733]: time="2024-02-09T19:16:02.564076957Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:02.566077 env[1733]: time="2024-02-09T19:16:02.566011925Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 19:16:02.572338 env[1733]: time="2024-02-09T19:16:02.572245759Z" level=info msg="CreateContainer within sandbox \"223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:16:02.598004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount335408347.mount: Deactivated successfully. Feb 9 19:16:02.611589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2087273127.mount: Deactivated successfully. Feb 9 19:16:02.615706 env[1733]: time="2024-02-09T19:16:02.615646115Z" level=info msg="CreateContainer within sandbox \"223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460\"" Feb 9 19:16:02.616835 env[1733]: time="2024-02-09T19:16:02.616784562Z" level=info msg="StartContainer for \"0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460\"" Feb 9 19:16:02.650383 systemd[1]: Started cri-containerd-0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460.scope. Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.683000 audit: BPF prog-id=126 op=LOAD Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3080 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303833313864373865623765636530613830653632313262316336 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3080 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303833313864373865623765636530613830653632313262316336 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.684000 audit: BPF prog-id=127 op=LOAD Feb 9 19:16:02.684000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3080 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303833313864373865623765636530613830653632313262316336 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit: BPF prog-id=128 op=LOAD Feb 9 19:16:02.685000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3080 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303833313864373865623765636530613830653632313262316336 Feb 9 19:16:02.685000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:16:02.685000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:02.685000 audit: BPF prog-id=129 op=LOAD Feb 9 19:16:02.685000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3080 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:02.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303833313864373865623765636530613830653632313262316336 Feb 9 19:16:02.718879 env[1733]: time="2024-02-09T19:16:02.718787791Z" level=info msg="StartContainer for \"0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460\" returns successfully" Feb 9 19:16:03.548703 kubelet[2973]: I0209 19:16:03.548657 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-2mm4k" podStartSLOduration=-9.2233720323062e+09 pod.CreationTimestamp="2024-02-09 19:15:59 +0000 UTC" firstStartedPulling="2024-02-09 19:15:59.879135066 +0000 UTC m=+14.987742784" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:03.548138709 +0000 UTC m=+18.656746427" watchObservedRunningTime="2024-02-09 19:16:03.548575965 +0000 UTC m=+18.657183683" Feb 9 19:16:06.416000 audit[3359]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.419511 kernel: kauditd_printk_skb: 351 callbacks suppressed Feb 9 19:16:06.419649 kernel: audit: type=1325 audit(1707506166.416:1097): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.416000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd9267da0 a2=0 a3=ffffbd0b46c0 items=0 ppid=3172 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.437091 kernel: audit: type=1300 audit(1707506166.416:1097): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd9267da0 a2=0 a3=ffffbd0b46c0 items=0 ppid=3172 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.437200 kernel: audit: type=1327 audit(1707506166.416:1097): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.416000 audit[3359]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.449151 kernel: audit: type=1325 audit(1707506166.416:1098): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.416000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd9267da0 a2=0 a3=ffffbd0b46c0 items=0 ppid=3172 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.462792 kernel: audit: type=1300 audit(1707506166.416:1098): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd9267da0 a2=0 a3=ffffbd0b46c0 items=0 ppid=3172 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.471808 kernel: audit: type=1327 audit(1707506166.416:1098): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.525672 kubelet[2973]: I0209 19:16:06.525627 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:06.537135 systemd[1]: Created slice kubepods-besteffort-pod7fb5e6b3_5a74_4e88_bc7b_2845804e409c.slice. Feb 9 19:16:06.560071 kubelet[2973]: I0209 19:16:06.560018 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7fb5e6b3-5a74-4e88-bc7b-2845804e409c-tigera-ca-bundle\") pod \"calico-typha-9996cbb49-th2kk\" (UID: \"7fb5e6b3-5a74-4e88-bc7b-2845804e409c\") " pod="calico-system/calico-typha-9996cbb49-th2kk" Feb 9 19:16:06.563993 kubelet[2973]: I0209 19:16:06.563941 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7fb5e6b3-5a74-4e88-bc7b-2845804e409c-typha-certs\") pod \"calico-typha-9996cbb49-th2kk\" (UID: \"7fb5e6b3-5a74-4e88-bc7b-2845804e409c\") " pod="calico-system/calico-typha-9996cbb49-th2kk" Feb 9 19:16:06.565100 kubelet[2973]: I0209 19:16:06.565020 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tnjjb\" (UniqueName: \"kubernetes.io/projected/7fb5e6b3-5a74-4e88-bc7b-2845804e409c-kube-api-access-tnjjb\") pod \"calico-typha-9996cbb49-th2kk\" (UID: \"7fb5e6b3-5a74-4e88-bc7b-2845804e409c\") " pod="calico-system/calico-typha-9996cbb49-th2kk" Feb 9 19:16:06.735418 kubelet[2973]: I0209 19:16:06.735284 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:06.746575 systemd[1]: Created slice kubepods-besteffort-pod825762c5_8090_41ca_a255_796ebe777ed5.slice. Feb 9 19:16:06.784000 audit[3387]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.784000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc13b9ef0 a2=0 a3=ffff946486c0 items=0 ppid=3172 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.804701 kernel: audit: type=1325 audit(1707506166.784:1099): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.804873 kernel: audit: type=1300 audit(1707506166.784:1099): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc13b9ef0 a2=0 a3=ffff946486c0 items=0 ppid=3172 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.812391 kernel: audit: type=1327 audit(1707506166.784:1099): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.805000 audit[3387]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.819120 kernel: audit: type=1325 audit(1707506166.805:1100): table=nat:106 family=2 entries=20 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:06.805000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc13b9ef0 a2=0 a3=ffff946486c0 items=0 ppid=3172 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:06.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:06.853270 env[1733]: time="2024-02-09T19:16:06.852728408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9996cbb49-th2kk,Uid:7fb5e6b3-5a74-4e88-bc7b-2845804e409c,Namespace:calico-system,Attempt:0,}" Feb 9 19:16:06.873119 kubelet[2973]: I0209 19:16:06.873072 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/825762c5-8090-41ca-a255-796ebe777ed5-node-certs\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.873522 kubelet[2973]: I0209 19:16:06.873494 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-var-lib-calico\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.873806 kubelet[2973]: I0209 19:16:06.873772 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-cni-log-dir\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.874035 kubelet[2973]: I0209 19:16:06.874007 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/825762c5-8090-41ca-a255-796ebe777ed5-tigera-ca-bundle\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.874203 kubelet[2973]: I0209 19:16:06.874182 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-cni-net-dir\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.876120 kubelet[2973]: I0209 19:16:06.876081 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-lib-modules\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.876445 kubelet[2973]: I0209 19:16:06.876409 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-flexvol-driver-host\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.876676 kubelet[2973]: I0209 19:16:06.876652 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-policysync\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.876884 kubelet[2973]: I0209 19:16:06.876849 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-cni-bin-dir\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.877060 kubelet[2973]: I0209 19:16:06.877026 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kf4zt\" (UniqueName: \"kubernetes.io/projected/825762c5-8090-41ca-a255-796ebe777ed5-kube-api-access-kf4zt\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.877230 kubelet[2973]: I0209 19:16:06.877196 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-xtables-lock\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.877460 kubelet[2973]: I0209 19:16:06.877425 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/825762c5-8090-41ca-a255-796ebe777ed5-var-run-calico\") pod \"calico-node-99s8f\" (UID: \"825762c5-8090-41ca-a255-796ebe777ed5\") " pod="calico-system/calico-node-99s8f" Feb 9 19:16:06.888358 kubelet[2973]: I0209 19:16:06.888312 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:06.889530 kubelet[2973]: E0209 19:16:06.889044 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:06.897690 env[1733]: time="2024-02-09T19:16:06.896606482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:06.897690 env[1733]: time="2024-02-09T19:16:06.896686380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:06.897690 env[1733]: time="2024-02-09T19:16:06.896730337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:06.899643 env[1733]: time="2024-02-09T19:16:06.898379105Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870 pid=3395 runtime=io.containerd.runc.v2 Feb 9 19:16:06.932166 systemd[1]: Started cri-containerd-44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870.scope. Feb 9 19:16:06.980289 kubelet[2973]: I0209 19:16:06.978836 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/04f10ca8-89eb-4abe-bab5-af8e8b58a32f-kubelet-dir\") pod \"csi-node-driver-pxrcm\" (UID: \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\") " pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:06.980289 kubelet[2973]: I0209 19:16:06.979050 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/04f10ca8-89eb-4abe-bab5-af8e8b58a32f-registration-dir\") pod \"csi-node-driver-pxrcm\" (UID: \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\") " pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:06.980289 kubelet[2973]: I0209 19:16:06.979155 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/04f10ca8-89eb-4abe-bab5-af8e8b58a32f-socket-dir\") pod \"csi-node-driver-pxrcm\" (UID: \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\") " pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:06.980289 kubelet[2973]: I0209 19:16:06.979203 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wc67s\" (UniqueName: \"kubernetes.io/projected/04f10ca8-89eb-4abe-bab5-af8e8b58a32f-kube-api-access-wc67s\") pod \"csi-node-driver-pxrcm\" (UID: \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\") " pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:06.980289 kubelet[2973]: I0209 19:16:06.979310 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/04f10ca8-89eb-4abe-bab5-af8e8b58a32f-varrun\") pod \"csi-node-driver-pxrcm\" (UID: \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\") " pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:06.981990 kubelet[2973]: E0209 19:16:06.981233 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.981990 kubelet[2973]: W0209 19:16:06.981292 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.981990 kubelet[2973]: E0209 19:16:06.981342 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:06.981990 kubelet[2973]: E0209 19:16:06.981716 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.981990 kubelet[2973]: W0209 19:16:06.981750 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.981990 kubelet[2973]: E0209 19:16:06.981779 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:06.982572 kubelet[2973]: E0209 19:16:06.982105 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.982572 kubelet[2973]: W0209 19:16:06.982124 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.982572 kubelet[2973]: E0209 19:16:06.982151 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:06.982760 kubelet[2973]: E0209 19:16:06.982579 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.982760 kubelet[2973]: W0209 19:16:06.982612 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.982760 kubelet[2973]: E0209 19:16:06.982645 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:06.987417 kubelet[2973]: E0209 19:16:06.985534 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.987417 kubelet[2973]: W0209 19:16:06.985573 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.987417 kubelet[2973]: E0209 19:16:06.985608 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:06.997119 kubelet[2973]: E0209 19:16:06.997083 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:06.997393 kubelet[2973]: W0209 19:16:06.997362 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:06.997545 kubelet[2973]: E0209 19:16:06.997522 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.013000 audit: BPF prog-id=130 op=LOAD Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3395 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656164383762623534386232373535666166333037313065323666 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3395 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656164383762623534386232373535666166333037313065323666 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.014000 audit: BPF prog-id=131 op=LOAD Feb 9 19:16:07.014000 audit[3404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3395 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656164383762623534386232373535666166333037313065323666 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit: BPF prog-id=132 op=LOAD Feb 9 19:16:07.015000 audit[3404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3395 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656164383762623534386232373535666166333037313065323666 Feb 9 19:16:07.015000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:16:07.015000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.015000 audit: BPF prog-id=133 op=LOAD Feb 9 19:16:07.015000 audit[3404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3395 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656164383762623534386232373535666166333037313065323666 Feb 9 19:16:07.080866 kubelet[2973]: E0209 19:16:07.080832 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.081116 kubelet[2973]: W0209 19:16:07.081086 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.081303 kubelet[2973]: E0209 19:16:07.081279 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.081937 kubelet[2973]: E0209 19:16:07.081906 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.082136 kubelet[2973]: W0209 19:16:07.082107 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.082308 kubelet[2973]: E0209 19:16:07.082275 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.083126 kubelet[2973]: E0209 19:16:07.083097 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.083545 kubelet[2973]: W0209 19:16:07.083508 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.083715 kubelet[2973]: E0209 19:16:07.083693 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.084150 kubelet[2973]: E0209 19:16:07.084112 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.084150 kubelet[2973]: W0209 19:16:07.084143 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.084481 kubelet[2973]: E0209 19:16:07.084186 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.084903 kubelet[2973]: E0209 19:16:07.084862 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.084903 kubelet[2973]: W0209 19:16:07.084894 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.085151 kubelet[2973]: E0209 19:16:07.085126 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.088499 kubelet[2973]: E0209 19:16:07.088462 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.088774 kubelet[2973]: W0209 19:16:07.088744 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.089096 kubelet[2973]: E0209 19:16:07.089073 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.089383 kubelet[2973]: E0209 19:16:07.089361 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.089513 kubelet[2973]: W0209 19:16:07.089487 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.089842 kubelet[2973]: E0209 19:16:07.089820 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.090187 kubelet[2973]: E0209 19:16:07.090165 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.090368 kubelet[2973]: W0209 19:16:07.090342 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.090640 kubelet[2973]: E0209 19:16:07.090618 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.091043 kubelet[2973]: E0209 19:16:07.091017 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.091201 kubelet[2973]: W0209 19:16:07.091174 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.091536 kubelet[2973]: E0209 19:16:07.091513 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.091820 kubelet[2973]: E0209 19:16:07.091799 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.091981 kubelet[2973]: W0209 19:16:07.091957 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.092226 kubelet[2973]: E0209 19:16:07.092206 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.093441 kubelet[2973]: E0209 19:16:07.093406 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.093655 kubelet[2973]: W0209 19:16:07.093610 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.093992 kubelet[2973]: E0209 19:16:07.093965 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.094486 kubelet[2973]: E0209 19:16:07.094459 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.094679 kubelet[2973]: W0209 19:16:07.094651 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.094960 kubelet[2973]: E0209 19:16:07.094937 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.095410 kubelet[2973]: E0209 19:16:07.095383 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.095572 kubelet[2973]: W0209 19:16:07.095544 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.095852 kubelet[2973]: E0209 19:16:07.095823 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.096270 kubelet[2973]: E0209 19:16:07.096231 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.096436 kubelet[2973]: W0209 19:16:07.096409 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.096696 kubelet[2973]: E0209 19:16:07.096674 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.097071 kubelet[2973]: E0209 19:16:07.097049 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.097210 kubelet[2973]: W0209 19:16:07.097185 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.097524 kubelet[2973]: E0209 19:16:07.097503 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.097878 kubelet[2973]: E0209 19:16:07.097857 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.097999 kubelet[2973]: W0209 19:16:07.097976 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.098270 kubelet[2973]: E0209 19:16:07.098235 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.098607 kubelet[2973]: E0209 19:16:07.098585 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.098776 kubelet[2973]: W0209 19:16:07.098751 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.099022 kubelet[2973]: E0209 19:16:07.099002 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.100451 kubelet[2973]: E0209 19:16:07.100417 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.100656 kubelet[2973]: W0209 19:16:07.100630 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.101688 kubelet[2973]: E0209 19:16:07.101657 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.102112 kubelet[2973]: E0209 19:16:07.102090 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.102240 kubelet[2973]: W0209 19:16:07.102214 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.102596 kubelet[2973]: E0209 19:16:07.102575 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.102965 kubelet[2973]: E0209 19:16:07.102945 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.103087 kubelet[2973]: W0209 19:16:07.103063 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.103360 kubelet[2973]: E0209 19:16:07.103340 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.103674 kubelet[2973]: E0209 19:16:07.103655 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.103813 kubelet[2973]: W0209 19:16:07.103790 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.104795 kubelet[2973]: E0209 19:16:07.104763 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.105316 kubelet[2973]: E0209 19:16:07.105224 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.105539 kubelet[2973]: W0209 19:16:07.105507 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.105922 kubelet[2973]: E0209 19:16:07.105895 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.106484 kubelet[2973]: E0209 19:16:07.106453 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.106656 kubelet[2973]: W0209 19:16:07.106628 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.106924 kubelet[2973]: E0209 19:16:07.106902 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.108607 kubelet[2973]: E0209 19:16:07.107332 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.110700 kubelet[2973]: W0209 19:16:07.110646 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.117682 kubelet[2973]: E0209 19:16:07.117646 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.118083 kubelet[2973]: E0209 19:16:07.118056 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.118282 kubelet[2973]: W0209 19:16:07.118222 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.118455 kubelet[2973]: E0209 19:16:07.118431 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.121468 kubelet[2973]: E0209 19:16:07.121428 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.121750 kubelet[2973]: W0209 19:16:07.121721 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.122165 kubelet[2973]: E0209 19:16:07.122139 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.143376 env[1733]: time="2024-02-09T19:16:07.143317505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9996cbb49-th2kk,Uid:7fb5e6b3-5a74-4e88-bc7b-2845804e409c,Namespace:calico-system,Attempt:0,} returns sandbox id \"44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870\"" Feb 9 19:16:07.146174 env[1733]: time="2024-02-09T19:16:07.146121348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:16:07.196454 kubelet[2973]: E0209 19:16:07.196419 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.196658 kubelet[2973]: W0209 19:16:07.196630 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.196832 kubelet[2973]: E0209 19:16:07.196810 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.199419 kubelet[2973]: E0209 19:16:07.199384 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.199631 kubelet[2973]: W0209 19:16:07.199601 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.199793 kubelet[2973]: E0209 19:16:07.199771 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.305577 kubelet[2973]: E0209 19:16:07.305428 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.305577 kubelet[2973]: W0209 19:16:07.305463 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.305577 kubelet[2973]: E0209 19:16:07.305511 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.311716 kubelet[2973]: E0209 19:16:07.310568 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.311716 kubelet[2973]: W0209 19:16:07.310768 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.311927 kubelet[2973]: E0209 19:16:07.311850 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.311927 kubelet[2973]: W0209 19:16:07.311871 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.311927 kubelet[2973]: E0209 19:16:07.311903 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.312090 kubelet[2973]: E0209 19:16:07.311948 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.313477 kubelet[2973]: E0209 19:16:07.313427 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.313689 kubelet[2973]: W0209 19:16:07.313657 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.313821 kubelet[2973]: E0209 19:16:07.313798 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.314436 kubelet[2973]: E0209 19:16:07.314406 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.314606 kubelet[2973]: W0209 19:16:07.314580 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.314760 kubelet[2973]: E0209 19:16:07.314739 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.317600 kubelet[2973]: E0209 19:16:07.317563 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.317834 kubelet[2973]: W0209 19:16:07.317807 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.317969 kubelet[2973]: E0209 19:16:07.317946 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.318521 kubelet[2973]: E0209 19:16:07.318494 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.318710 kubelet[2973]: W0209 19:16:07.318684 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.318936 kubelet[2973]: E0209 19:16:07.318913 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.319964 kubelet[2973]: E0209 19:16:07.319933 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.320182 kubelet[2973]: W0209 19:16:07.320155 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.320343 kubelet[2973]: E0209 19:16:07.320321 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.356485 env[1733]: time="2024-02-09T19:16:07.355915555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-99s8f,Uid:825762c5-8090-41ca-a255-796ebe777ed5,Namespace:calico-system,Attempt:0,}" Feb 9 19:16:07.392778 env[1733]: time="2024-02-09T19:16:07.392635396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:07.392964 env[1733]: time="2024-02-09T19:16:07.392737362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:07.392964 env[1733]: time="2024-02-09T19:16:07.392766391Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:07.394009 env[1733]: time="2024-02-09T19:16:07.393888778Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d pid=3480 runtime=io.containerd.runc.v2 Feb 9 19:16:07.414176 kubelet[2973]: E0209 19:16:07.414130 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.414176 kubelet[2973]: W0209 19:16:07.414165 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.414974 kubelet[2973]: E0209 19:16:07.414203 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.425358 systemd[1]: Started cri-containerd-342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d.scope. Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.459000 audit: BPF prog-id=134 op=LOAD Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3480 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334326437613161356139393065303566326631653636656335633332 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3480 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334326437613161356139393065303566326631653636656335633332 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit: BPF prog-id=135 op=LOAD Feb 9 19:16:07.460000 audit[3491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3480 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334326437613161356139393065303566326631653636656335633332 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit: BPF prog-id=136 op=LOAD Feb 9 19:16:07.460000 audit[3491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3480 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334326437613161356139393065303566326631653636656335633332 Feb 9 19:16:07.460000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:16:07.460000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:07.460000 audit: BPF prog-id=137 op=LOAD Feb 9 19:16:07.460000 audit[3491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3480 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334326437613161356139393065303566326631653636656335633332 Feb 9 19:16:07.508308 kubelet[2973]: E0209 19:16:07.508242 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:07.508308 kubelet[2973]: W0209 19:16:07.508297 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:07.508536 kubelet[2973]: E0209 19:16:07.508336 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:07.509790 env[1733]: time="2024-02-09T19:16:07.509735404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-99s8f,Uid:825762c5-8090-41ca-a255-796ebe777ed5,Namespace:calico-system,Attempt:0,} returns sandbox id \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\"" Feb 9 19:16:07.684640 systemd[1]: run-containerd-runc-k8s.io-44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870-runc.3t5VLz.mount: Deactivated successfully. Feb 9 19:16:07.979000 audit[3543]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:07.979000 audit[3543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffff9b0e3b0 a2=0 a3=ffff90e2a6c0 items=0 ppid=3172 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:07.981000 audit[3543]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:07.981000 audit[3543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff9b0e3b0 a2=0 a3=ffff90e2a6c0 items=0 ppid=3172 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:07.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:08.475289 kubelet[2973]: E0209 19:16:08.475205 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:08.503857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount758221796.mount: Deactivated successfully. Feb 9 19:16:10.082422 env[1733]: time="2024-02-09T19:16:10.082353635Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:10.087305 env[1733]: time="2024-02-09T19:16:10.087217523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:10.091500 env[1733]: time="2024-02-09T19:16:10.091431057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:10.095883 env[1733]: time="2024-02-09T19:16:10.095806582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:10.098326 env[1733]: time="2024-02-09T19:16:10.097176772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 19:16:10.099209 env[1733]: time="2024-02-09T19:16:10.099156876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:16:10.132942 env[1733]: time="2024-02-09T19:16:10.132861592Z" level=info msg="CreateContainer within sandbox \"44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:16:10.157368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3812540620.mount: Deactivated successfully. Feb 9 19:16:10.165679 env[1733]: time="2024-02-09T19:16:10.165585119Z" level=info msg="CreateContainer within sandbox \"44ead87bb548b2755faf30710e26fe7b8f15d256e75e40192bf889bb135c6870\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ed22c7e8e7c70a2c1417e0e47c2873467242032ba8a671a42239b6ef6488439a\"" Feb 9 19:16:10.166342 env[1733]: time="2024-02-09T19:16:10.166292750Z" level=info msg="StartContainer for \"ed22c7e8e7c70a2c1417e0e47c2873467242032ba8a671a42239b6ef6488439a\"" Feb 9 19:16:10.221363 systemd[1]: Started cri-containerd-ed22c7e8e7c70a2c1417e0e47c2873467242032ba8a671a42239b6ef6488439a.scope. Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.277000 audit: BPF prog-id=138 op=LOAD Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3395 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:10.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564323263376538653763373061326331343137653065343763323837 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3395 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:10.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564323263376538653763373061326331343137653065343763323837 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.278000 audit: BPF prog-id=139 op=LOAD Feb 9 19:16:10.278000 audit[3552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3395 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:10.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564323263376538653763373061326331343137653065343763323837 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit: BPF prog-id=140 op=LOAD Feb 9 19:16:10.279000 audit[3552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3395 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:10.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564323263376538653763373061326331343137653065343763323837 Feb 9 19:16:10.279000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:16:10.279000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { perfmon } for pid=3552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit[3552]: AVC avc: denied { bpf } for pid=3552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:10.279000 audit: BPF prog-id=141 op=LOAD Feb 9 19:16:10.279000 audit[3552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3395 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:10.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564323263376538653763373061326331343137653065343763323837 Feb 9 19:16:10.337633 env[1733]: time="2024-02-09T19:16:10.337425681Z" level=info msg="StartContainer for \"ed22c7e8e7c70a2c1417e0e47c2873467242032ba8a671a42239b6ef6488439a\" returns successfully" Feb 9 19:16:10.475477 kubelet[2973]: E0209 19:16:10.475397 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:10.661863 kubelet[2973]: E0209 19:16:10.661710 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.661863 kubelet[2973]: W0209 19:16:10.661748 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.661863 kubelet[2973]: E0209 19:16:10.661784 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.663009 kubelet[2973]: E0209 19:16:10.662956 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.663009 kubelet[2973]: W0209 19:16:10.662993 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.663220 kubelet[2973]: E0209 19:16:10.663031 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.663515 kubelet[2973]: E0209 19:16:10.663481 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.663515 kubelet[2973]: W0209 19:16:10.663509 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.663709 kubelet[2973]: E0209 19:16:10.663540 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.664109 kubelet[2973]: E0209 19:16:10.664072 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.664109 kubelet[2973]: W0209 19:16:10.664102 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.664388 kubelet[2973]: E0209 19:16:10.664131 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.664460 kubelet[2973]: E0209 19:16:10.664445 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.664522 kubelet[2973]: W0209 19:16:10.664463 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.664522 kubelet[2973]: E0209 19:16:10.664488 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.665132 kubelet[2973]: E0209 19:16:10.665083 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.665132 kubelet[2973]: W0209 19:16:10.665113 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.665328 kubelet[2973]: E0209 19:16:10.665146 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.665599 kubelet[2973]: E0209 19:16:10.665564 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.665599 kubelet[2973]: W0209 19:16:10.665592 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.665731 kubelet[2973]: E0209 19:16:10.665621 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.666237 kubelet[2973]: E0209 19:16:10.666201 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.666237 kubelet[2973]: W0209 19:16:10.666231 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.666418 kubelet[2973]: E0209 19:16:10.666301 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.666642 kubelet[2973]: E0209 19:16:10.666608 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.666642 kubelet[2973]: W0209 19:16:10.666634 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.666772 kubelet[2973]: E0209 19:16:10.666661 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.667266 kubelet[2973]: E0209 19:16:10.667217 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.667392 kubelet[2973]: W0209 19:16:10.667247 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.667392 kubelet[2973]: E0209 19:16:10.667379 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.667725 kubelet[2973]: E0209 19:16:10.667691 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.667725 kubelet[2973]: W0209 19:16:10.667718 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.667859 kubelet[2973]: E0209 19:16:10.667745 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.668313 kubelet[2973]: E0209 19:16:10.668226 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.668424 kubelet[2973]: W0209 19:16:10.668318 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.668424 kubelet[2973]: E0209 19:16:10.668351 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.736485 kubelet[2973]: E0209 19:16:10.736437 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.736485 kubelet[2973]: W0209 19:16:10.736473 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.736720 kubelet[2973]: E0209 19:16:10.736508 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.737213 kubelet[2973]: E0209 19:16:10.737172 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.737213 kubelet[2973]: W0209 19:16:10.737206 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.737460 kubelet[2973]: E0209 19:16:10.737286 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.737896 kubelet[2973]: E0209 19:16:10.737856 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.737896 kubelet[2973]: W0209 19:16:10.737888 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.738082 kubelet[2973]: E0209 19:16:10.737932 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.739533 kubelet[2973]: E0209 19:16:10.739485 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.739533 kubelet[2973]: W0209 19:16:10.739521 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.739822 kubelet[2973]: E0209 19:16:10.739795 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.740339 kubelet[2973]: E0209 19:16:10.740221 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.740339 kubelet[2973]: W0209 19:16:10.740296 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.740636 kubelet[2973]: E0209 19:16:10.740609 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.741083 kubelet[2973]: E0209 19:16:10.741048 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.741083 kubelet[2973]: W0209 19:16:10.741077 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.741350 kubelet[2973]: E0209 19:16:10.741313 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.741473 kubelet[2973]: E0209 19:16:10.741440 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.741473 kubelet[2973]: W0209 19:16:10.741466 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.741670 kubelet[2973]: E0209 19:16:10.741648 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.742043 kubelet[2973]: E0209 19:16:10.741994 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.742043 kubelet[2973]: W0209 19:16:10.742021 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.742240 kubelet[2973]: E0209 19:16:10.742062 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.742473 kubelet[2973]: E0209 19:16:10.742435 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.742473 kubelet[2973]: W0209 19:16:10.742469 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.742623 kubelet[2973]: E0209 19:16:10.742511 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.744456 kubelet[2973]: E0209 19:16:10.744408 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.744456 kubelet[2973]: W0209 19:16:10.744445 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.744778 kubelet[2973]: E0209 19:16:10.744752 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.745025 kubelet[2973]: E0209 19:16:10.744849 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.745025 kubelet[2973]: W0209 19:16:10.745019 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.745427 kubelet[2973]: E0209 19:16:10.745392 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.745427 kubelet[2973]: W0209 19:16:10.745419 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.745596 kubelet[2973]: E0209 19:16:10.745449 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.746003 kubelet[2973]: E0209 19:16:10.745968 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.746485 kubelet[2973]: E0209 19:16:10.746447 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.746485 kubelet[2973]: W0209 19:16:10.746478 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.746650 kubelet[2973]: E0209 19:16:10.746525 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.747166 kubelet[2973]: E0209 19:16:10.747097 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.747166 kubelet[2973]: W0209 19:16:10.747125 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.747166 kubelet[2973]: E0209 19:16:10.747164 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.748473 kubelet[2973]: E0209 19:16:10.748429 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.748473 kubelet[2973]: W0209 19:16:10.748462 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.748688 kubelet[2973]: E0209 19:16:10.748510 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.748924 kubelet[2973]: E0209 19:16:10.748882 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.748924 kubelet[2973]: W0209 19:16:10.748910 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.749060 kubelet[2973]: E0209 19:16:10.748939 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.749431 kubelet[2973]: E0209 19:16:10.749397 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.749431 kubelet[2973]: W0209 19:16:10.749429 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.749595 kubelet[2973]: E0209 19:16:10.749457 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:10.750101 kubelet[2973]: E0209 19:16:10.750069 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:10.750101 kubelet[2973]: W0209 19:16:10.750096 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:10.750238 kubelet[2973]: E0209 19:16:10.750125 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.586910 kubelet[2973]: I0209 19:16:11.586795 2973 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:16:11.675581 kubelet[2973]: E0209 19:16:11.675513 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.675581 kubelet[2973]: W0209 19:16:11.675570 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.675885 kubelet[2973]: E0209 19:16:11.675627 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.676108 kubelet[2973]: E0209 19:16:11.676070 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.676108 kubelet[2973]: W0209 19:16:11.676100 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.676108 kubelet[2973]: E0209 19:16:11.676130 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.676615 kubelet[2973]: E0209 19:16:11.676518 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.676615 kubelet[2973]: W0209 19:16:11.676537 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.676615 kubelet[2973]: E0209 19:16:11.676562 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.677021 kubelet[2973]: E0209 19:16:11.676976 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.677021 kubelet[2973]: W0209 19:16:11.677025 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.677021 kubelet[2973]: E0209 19:16:11.677054 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.677465 kubelet[2973]: E0209 19:16:11.677413 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.677465 kubelet[2973]: W0209 19:16:11.677459 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.677642 kubelet[2973]: E0209 19:16:11.677486 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.678032 kubelet[2973]: E0209 19:16:11.677982 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.678032 kubelet[2973]: W0209 19:16:11.678013 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.678189 kubelet[2973]: E0209 19:16:11.678042 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.679416 kubelet[2973]: E0209 19:16:11.678695 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.679416 kubelet[2973]: W0209 19:16:11.678731 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.679416 kubelet[2973]: E0209 19:16:11.678765 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.679975 kubelet[2973]: E0209 19:16:11.679938 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.680347 kubelet[2973]: W0209 19:16:11.680226 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.680555 kubelet[2973]: E0209 19:16:11.680533 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.682604 kubelet[2973]: E0209 19:16:11.682561 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.682816 kubelet[2973]: W0209 19:16:11.682612 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.682816 kubelet[2973]: E0209 19:16:11.682652 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.684364 kubelet[2973]: E0209 19:16:11.684314 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.684364 kubelet[2973]: W0209 19:16:11.684353 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.684584 kubelet[2973]: E0209 19:16:11.684392 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.684966 kubelet[2973]: E0209 19:16:11.684928 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.684966 kubelet[2973]: W0209 19:16:11.684958 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.685148 kubelet[2973]: E0209 19:16:11.684988 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.686800 kubelet[2973]: E0209 19:16:11.686755 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.686800 kubelet[2973]: W0209 19:16:11.686789 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.687000 kubelet[2973]: E0209 19:16:11.686826 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.745341 kubelet[2973]: E0209 19:16:11.745001 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.745341 kubelet[2973]: W0209 19:16:11.745036 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.745341 kubelet[2973]: E0209 19:16:11.745075 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.748033 kubelet[2973]: E0209 19:16:11.747816 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.748033 kubelet[2973]: W0209 19:16:11.747850 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.748033 kubelet[2973]: E0209 19:16:11.747904 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.748666 kubelet[2973]: E0209 19:16:11.748626 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.748666 kubelet[2973]: W0209 19:16:11.748661 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.748901 kubelet[2973]: E0209 19:16:11.748712 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.749590 kubelet[2973]: E0209 19:16:11.749547 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.749590 kubelet[2973]: W0209 19:16:11.749582 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.750842 kubelet[2973]: E0209 19:16:11.749835 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.753734 kubelet[2973]: E0209 19:16:11.753674 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.753734 kubelet[2973]: W0209 19:16:11.753723 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.754581 kubelet[2973]: E0209 19:16:11.754040 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.755433 kubelet[2973]: E0209 19:16:11.755385 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.755433 kubelet[2973]: W0209 19:16:11.755424 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.755921 kubelet[2973]: E0209 19:16:11.755694 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.758374 kubelet[2973]: E0209 19:16:11.758325 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.758374 kubelet[2973]: W0209 19:16:11.758363 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.762497 kubelet[2973]: E0209 19:16:11.758763 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.763410 kubelet[2973]: E0209 19:16:11.763366 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.763410 kubelet[2973]: W0209 19:16:11.763402 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.763849 kubelet[2973]: E0209 19:16:11.763639 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.765510 kubelet[2973]: E0209 19:16:11.765422 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.765510 kubelet[2973]: W0209 19:16:11.765455 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.766482 kubelet[2973]: E0209 19:16:11.765770 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.767300 kubelet[2973]: E0209 19:16:11.766742 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.767300 kubelet[2973]: W0209 19:16:11.766802 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.768217 kubelet[2973]: E0209 19:16:11.767503 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.769295 kubelet[2973]: E0209 19:16:11.768601 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.769295 kubelet[2973]: W0209 19:16:11.768636 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.769744 kubelet[2973]: E0209 19:16:11.769554 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.770006 kubelet[2973]: E0209 19:16:11.769933 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.770006 kubelet[2973]: W0209 19:16:11.770000 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.770433 kubelet[2973]: E0209 19:16:11.770220 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.770780 kubelet[2973]: E0209 19:16:11.770630 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.770780 kubelet[2973]: W0209 19:16:11.770658 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.771161 kubelet[2973]: E0209 19:16:11.770979 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.772873 kubelet[2973]: E0209 19:16:11.772799 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.772873 kubelet[2973]: W0209 19:16:11.772866 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.773426 kubelet[2973]: E0209 19:16:11.773164 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.773657 kubelet[2973]: E0209 19:16:11.773622 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.773657 kubelet[2973]: W0209 19:16:11.773653 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.774075 kubelet[2973]: E0209 19:16:11.773696 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.778610 kubelet[2973]: E0209 19:16:11.778450 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.778610 kubelet[2973]: W0209 19:16:11.778495 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.779026 kubelet[2973]: E0209 19:16:11.778846 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.784994 kubelet[2973]: E0209 19:16:11.784336 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.784994 kubelet[2973]: W0209 19:16:11.784383 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.784994 kubelet[2973]: E0209 19:16:11.784421 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.785630 kubelet[2973]: E0209 19:16:11.785517 2973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:16:11.785630 kubelet[2973]: W0209 19:16:11.785545 2973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:16:11.785630 kubelet[2973]: E0209 19:16:11.785580 2973 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:16:11.963426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1897535277.mount: Deactivated successfully. Feb 9 19:16:12.132627 env[1733]: time="2024-02-09T19:16:12.132544848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:12.135610 env[1733]: time="2024-02-09T19:16:12.135545680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:12.138416 env[1733]: time="2024-02-09T19:16:12.138352096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:12.140963 env[1733]: time="2024-02-09T19:16:12.140912134Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:12.142027 env[1733]: time="2024-02-09T19:16:12.141981369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 19:16:12.148837 env[1733]: time="2024-02-09T19:16:12.148742697Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:16:12.178779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307962549.mount: Deactivated successfully. Feb 9 19:16:12.188520 env[1733]: time="2024-02-09T19:16:12.188412818Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7\"" Feb 9 19:16:12.190514 env[1733]: time="2024-02-09T19:16:12.190446561Z" level=info msg="StartContainer for \"461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7\"" Feb 9 19:16:12.248974 systemd[1]: run-containerd-runc-k8s.io-461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7-runc.bNSJWy.mount: Deactivated successfully. Feb 9 19:16:12.254546 systemd[1]: Started cri-containerd-461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7.scope. Feb 9 19:16:12.284000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.287675 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 19:16:12.287754 kernel: audit: type=1400 audit(1707506172.284:1157): avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.284000 audit[3649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3480 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:12.306547 kernel: audit: type=1300 audit(1707506172.284:1157): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3480 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:12.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436316134666639323266616466353065343661636635613431386464 Feb 9 19:16:12.318163 kernel: audit: type=1327 audit(1707506172.284:1157): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436316134666639323266616466353065343661636635613431386464 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.326119 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.334164 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.341797 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.349479 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.353935 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.364380 env[1733]: time="2024-02-09T19:16:12.364053131Z" level=info msg="StartContainer for \"461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7\" returns successfully" Feb 9 19:16:12.371500 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.384482 kernel: audit: type=1400 audit(1707506172.286:1158): avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.286000 audit: BPF prog-id=142 op=LOAD Feb 9 19:16:12.286000 audit[3649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3480 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:12.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436316134666639323266616466353065343661636635613431386464 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.294000 audit: BPF prog-id=143 op=LOAD Feb 9 19:16:12.294000 audit[3649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3480 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:12.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436316134666639323266616466353065343661636635613431386464 Feb 9 19:16:12.305000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:16:12.305000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:12.305000 audit: BPF prog-id=144 op=LOAD Feb 9 19:16:12.305000 audit[3649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3480 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:12.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436316134666639323266616466353065343661636635613431386464 Feb 9 19:16:12.391836 systemd[1]: cri-containerd-461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7.scope: Deactivated successfully. Feb 9 19:16:12.395000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:16:12.475779 kubelet[2973]: E0209 19:16:12.475728 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:12.623225 kubelet[2973]: I0209 19:16:12.620412 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-9996cbb49-th2kk" podStartSLOduration=-9.223372030234423e+09 pod.CreationTimestamp="2024-02-09 19:16:06 +0000 UTC" firstStartedPulling="2024-02-09 19:16:07.145400491 +0000 UTC m=+22.254008197" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:10.623901967 +0000 UTC m=+25.732509757" watchObservedRunningTime="2024-02-09 19:16:12.620353127 +0000 UTC m=+27.728960845" Feb 9 19:16:12.778230 env[1733]: time="2024-02-09T19:16:12.778166292Z" level=info msg="shim disconnected" id=461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7 Feb 9 19:16:12.778540 env[1733]: time="2024-02-09T19:16:12.778505395Z" level=warning msg="cleaning up after shim disconnected" id=461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7 namespace=k8s.io Feb 9 19:16:12.778663 env[1733]: time="2024-02-09T19:16:12.778633666Z" level=info msg="cleaning up dead shim" Feb 9 19:16:12.793531 env[1733]: time="2024-02-09T19:16:12.793471526Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:16:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3692 runtime=io.containerd.runc.v2\n" Feb 9 19:16:13.172263 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-461a4ff922fadf50e46acf5a418dd060c730da69f18305046a0c1d1f95281fb7-rootfs.mount: Deactivated successfully. Feb 9 19:16:13.599512 env[1733]: time="2024-02-09T19:16:13.599339078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:16:14.475161 kubelet[2973]: E0209 19:16:14.475120 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:14.836158 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4100345632.mount: Deactivated successfully. Feb 9 19:16:16.475480 kubelet[2973]: E0209 19:16:16.475403 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:18.475542 kubelet[2973]: E0209 19:16:18.475483 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:19.333936 env[1733]: time="2024-02-09T19:16:19.333877283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:19.336559 env[1733]: time="2024-02-09T19:16:19.336510841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:19.339319 env[1733]: time="2024-02-09T19:16:19.339231640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:19.341925 env[1733]: time="2024-02-09T19:16:19.341876574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:19.342895 env[1733]: time="2024-02-09T19:16:19.342852793Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 19:16:19.348175 env[1733]: time="2024-02-09T19:16:19.348120844Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:16:19.373304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2383937159.mount: Deactivated successfully. Feb 9 19:16:19.385290 env[1733]: time="2024-02-09T19:16:19.385113933Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b\"" Feb 9 19:16:19.388537 env[1733]: time="2024-02-09T19:16:19.388455516Z" level=info msg="StartContainer for \"f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b\"" Feb 9 19:16:19.442962 systemd[1]: run-containerd-runc-k8s.io-f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b-runc.rMEVvZ.mount: Deactivated successfully. Feb 9 19:16:19.451329 systemd[1]: Started cri-containerd-f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b.scope. Feb 9 19:16:19.489000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.492676 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:16:19.492774 kernel: audit: type=1400 audit(1707506179.489:1164): avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.489000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=3480 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:19.512051 kernel: audit: type=1300 audit(1707506179.489:1164): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=3480 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333830353832363332616636396631633433663834666637306137 Feb 9 19:16:19.523106 kernel: audit: type=1327 audit(1707506179.489:1164): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333830353832363332616636396631633433663834666637306137 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.531419 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.539698 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.551304 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.559078 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.566665 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.574640 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.574737 kernel: audit: type=1400 audit(1707506179.499:1165): avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit: BPF prog-id=145 op=LOAD Feb 9 19:16:19.499000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=3480 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:19.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333830353832363332616636396631633433663834666637306137 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit: BPF prog-id=146 op=LOAD Feb 9 19:16:19.499000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=3480 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:19.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333830353832363332616636396631633433663834666637306137 Feb 9 19:16:19.499000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:16:19.499000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:19.499000 audit: BPF prog-id=147 op=LOAD Feb 9 19:16:19.499000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=3480 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:19.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333830353832363332616636396631633433663834666637306137 Feb 9 19:16:19.593761 env[1733]: time="2024-02-09T19:16:19.593684136Z" level=info msg="StartContainer for \"f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b\" returns successfully" Feb 9 19:16:20.475754 kubelet[2973]: E0209 19:16:20.475699 2973 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:20.592408 env[1733]: time="2024-02-09T19:16:20.592162968Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:16:20.599113 systemd[1]: cri-containerd-f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b.scope: Deactivated successfully. Feb 9 19:16:20.601000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:16:20.626629 kubelet[2973]: I0209 19:16:20.625160 2973 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:16:20.664077 kubelet[2973]: I0209 19:16:20.662970 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:20.668354 kubelet[2973]: I0209 19:16:20.668310 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:20.668932 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b-rootfs.mount: Deactivated successfully. Feb 9 19:16:20.671286 kubelet[2973]: I0209 19:16:20.671216 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:16:20.687015 systemd[1]: Created slice kubepods-burstable-pod3e04e50e_1216_4f6a_bb2e_33f2f8324b05.slice. Feb 9 19:16:20.706518 systemd[1]: Created slice kubepods-besteffort-podeb35ee47_58b8_40d7_bda1_e3cee98f51e7.slice. Feb 9 19:16:20.711770 kubelet[2973]: I0209 19:16:20.711727 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zdpd\" (UniqueName: \"kubernetes.io/projected/3e04e50e-1216-4f6a-bb2e-33f2f8324b05-kube-api-access-8zdpd\") pod \"coredns-787d4945fb-47dbl\" (UID: \"3e04e50e-1216-4f6a-bb2e-33f2f8324b05\") " pod="kube-system/coredns-787d4945fb-47dbl" Feb 9 19:16:20.712133 kubelet[2973]: I0209 19:16:20.712108 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8f8906a9-b159-4dc8-b05a-9a8c1edca628-config-volume\") pod \"coredns-787d4945fb-r2lgn\" (UID: \"8f8906a9-b159-4dc8-b05a-9a8c1edca628\") " pod="kube-system/coredns-787d4945fb-r2lgn" Feb 9 19:16:20.712316 kubelet[2973]: I0209 19:16:20.712295 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7sfvj\" (UniqueName: \"kubernetes.io/projected/eb35ee47-58b8-40d7-bda1-e3cee98f51e7-kube-api-access-7sfvj\") pod \"calico-kube-controllers-8b8b775d-q5f7l\" (UID: \"eb35ee47-58b8-40d7-bda1-e3cee98f51e7\") " pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" Feb 9 19:16:20.712499 kubelet[2973]: I0209 19:16:20.712478 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b994d\" (UniqueName: \"kubernetes.io/projected/8f8906a9-b159-4dc8-b05a-9a8c1edca628-kube-api-access-b994d\") pod \"coredns-787d4945fb-r2lgn\" (UID: \"8f8906a9-b159-4dc8-b05a-9a8c1edca628\") " pod="kube-system/coredns-787d4945fb-r2lgn" Feb 9 19:16:20.712665 kubelet[2973]: I0209 19:16:20.712631 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3e04e50e-1216-4f6a-bb2e-33f2f8324b05-config-volume\") pod \"coredns-787d4945fb-47dbl\" (UID: \"3e04e50e-1216-4f6a-bb2e-33f2f8324b05\") " pod="kube-system/coredns-787d4945fb-47dbl" Feb 9 19:16:20.712855 kubelet[2973]: I0209 19:16:20.712832 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eb35ee47-58b8-40d7-bda1-e3cee98f51e7-tigera-ca-bundle\") pod \"calico-kube-controllers-8b8b775d-q5f7l\" (UID: \"eb35ee47-58b8-40d7-bda1-e3cee98f51e7\") " pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" Feb 9 19:16:20.725059 systemd[1]: Created slice kubepods-burstable-pod8f8906a9_b159_4dc8_b05a_9a8c1edca628.slice. Feb 9 19:16:21.000782 env[1733]: time="2024-02-09T19:16:21.000705021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-47dbl,Uid:3e04e50e-1216-4f6a-bb2e-33f2f8324b05,Namespace:kube-system,Attempt:0,}" Feb 9 19:16:21.019613 env[1733]: time="2024-02-09T19:16:21.019467535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b8b775d-q5f7l,Uid:eb35ee47-58b8-40d7-bda1-e3cee98f51e7,Namespace:calico-system,Attempt:0,}" Feb 9 19:16:21.033765 env[1733]: time="2024-02-09T19:16:21.033619456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r2lgn,Uid:8f8906a9-b159-4dc8-b05a-9a8c1edca628,Namespace:kube-system,Attempt:0,}" Feb 9 19:16:21.806891 env[1733]: time="2024-02-09T19:16:21.806556998Z" level=info msg="shim disconnected" id=f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b Feb 9 19:16:21.806891 env[1733]: time="2024-02-09T19:16:21.806634832Z" level=warning msg="cleaning up after shim disconnected" id=f3380582632af69f1c43f84ff70a79c0ed48a4145bab17b1da4a7ee1e6bcd98b namespace=k8s.io Feb 9 19:16:21.806891 env[1733]: time="2024-02-09T19:16:21.806657032Z" level=info msg="cleaning up dead shim" Feb 9 19:16:21.866782 env[1733]: time="2024-02-09T19:16:21.866708096Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:16:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3763 runtime=io.containerd.runc.v2\n" Feb 9 19:16:22.005782 env[1733]: time="2024-02-09T19:16:22.005684518Z" level=error msg="Failed to destroy network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.006523 env[1733]: time="2024-02-09T19:16:22.006450588Z" level=error msg="encountered an error cleaning up failed sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.006674 env[1733]: time="2024-02-09T19:16:22.006549829Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-47dbl,Uid:3e04e50e-1216-4f6a-bb2e-33f2f8324b05,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.006922 kubelet[2973]: E0209 19:16:22.006869 2973 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.007647 kubelet[2973]: E0209 19:16:22.006958 2973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-47dbl" Feb 9 19:16:22.007647 kubelet[2973]: E0209 19:16:22.006999 2973 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-47dbl" Feb 9 19:16:22.007647 kubelet[2973]: E0209 19:16:22.007090 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-47dbl_kube-system(3e04e50e-1216-4f6a-bb2e-33f2f8324b05)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-47dbl_kube-system(3e04e50e-1216-4f6a-bb2e-33f2f8324b05)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-47dbl" podUID=3e04e50e-1216-4f6a-bb2e-33f2f8324b05 Feb 9 19:16:22.039401 env[1733]: time="2024-02-09T19:16:22.039312730Z" level=error msg="Failed to destroy network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.040226 env[1733]: time="2024-02-09T19:16:22.040120273Z" level=error msg="encountered an error cleaning up failed sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.040400 env[1733]: time="2024-02-09T19:16:22.040309204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r2lgn,Uid:8f8906a9-b159-4dc8-b05a-9a8c1edca628,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.041088 kubelet[2973]: E0209 19:16:22.040743 2973 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.041088 kubelet[2973]: E0209 19:16:22.040846 2973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-r2lgn" Feb 9 19:16:22.041088 kubelet[2973]: E0209 19:16:22.040889 2973 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-r2lgn" Feb 9 19:16:22.042927 kubelet[2973]: E0209 19:16:22.041036 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-r2lgn_kube-system(8f8906a9-b159-4dc8-b05a-9a8c1edca628)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-r2lgn_kube-system(8f8906a9-b159-4dc8-b05a-9a8c1edca628)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r2lgn" podUID=8f8906a9-b159-4dc8-b05a-9a8c1edca628 Feb 9 19:16:22.049565 env[1733]: time="2024-02-09T19:16:22.049484607Z" level=error msg="Failed to destroy network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.050216 env[1733]: time="2024-02-09T19:16:22.050114595Z" level=error msg="encountered an error cleaning up failed sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.050437 env[1733]: time="2024-02-09T19:16:22.050301666Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b8b775d-q5f7l,Uid:eb35ee47-58b8-40d7-bda1-e3cee98f51e7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.050788 kubelet[2973]: E0209 19:16:22.050730 2973 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.050918 kubelet[2973]: E0209 19:16:22.050839 2973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" Feb 9 19:16:22.050918 kubelet[2973]: E0209 19:16:22.050880 2973 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" Feb 9 19:16:22.053461 kubelet[2973]: E0209 19:16:22.051423 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8b8b775d-q5f7l_calico-system(eb35ee47-58b8-40d7-bda1-e3cee98f51e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8b8b775d-q5f7l_calico-system(eb35ee47-58b8-40d7-bda1-e3cee98f51e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" podUID=eb35ee47-58b8-40d7-bda1-e3cee98f51e7 Feb 9 19:16:22.484892 systemd[1]: Created slice kubepods-besteffort-pod04f10ca8_89eb_4abe_bab5_af8e8b58a32f.slice. Feb 9 19:16:22.490219 env[1733]: time="2024-02-09T19:16:22.490162298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pxrcm,Uid:04f10ca8-89eb-4abe-bab5-af8e8b58a32f,Namespace:calico-system,Attempt:0,}" Feb 9 19:16:22.591057 env[1733]: time="2024-02-09T19:16:22.590958638Z" level=error msg="Failed to destroy network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.591691 env[1733]: time="2024-02-09T19:16:22.591629666Z" level=error msg="encountered an error cleaning up failed sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.591822 env[1733]: time="2024-02-09T19:16:22.591720964Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pxrcm,Uid:04f10ca8-89eb-4abe-bab5-af8e8b58a32f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.592193 kubelet[2973]: E0209 19:16:22.592094 2973 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.592328 kubelet[2973]: E0209 19:16:22.592292 2973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:22.592419 kubelet[2973]: E0209 19:16:22.592337 2973 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pxrcm" Feb 9 19:16:22.592487 kubelet[2973]: E0209 19:16:22.592467 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pxrcm_calico-system(04f10ca8-89eb-4abe-bab5-af8e8b58a32f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pxrcm_calico-system(04f10ca8-89eb-4abe-bab5-af8e8b58a32f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:22.624306 kubelet[2973]: I0209 19:16:22.623569 2973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:22.626864 env[1733]: time="2024-02-09T19:16:22.625578801Z" level=info msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" Feb 9 19:16:22.629531 kubelet[2973]: I0209 19:16:22.629496 2973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:22.631846 env[1733]: time="2024-02-09T19:16:22.631124114Z" level=info msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" Feb 9 19:16:22.635441 kubelet[2973]: I0209 19:16:22.635406 2973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:22.637594 env[1733]: time="2024-02-09T19:16:22.637495378Z" level=info msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" Feb 9 19:16:22.641523 kubelet[2973]: I0209 19:16:22.641466 2973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:22.646047 env[1733]: time="2024-02-09T19:16:22.644778994Z" level=info msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" Feb 9 19:16:22.658187 env[1733]: time="2024-02-09T19:16:22.655999367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:16:22.770300 env[1733]: time="2024-02-09T19:16:22.768767401Z" level=error msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" failed" error="failed to destroy network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.770489 kubelet[2973]: E0209 19:16:22.769131 2973 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:22.770489 kubelet[2973]: E0209 19:16:22.769206 2973 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4} Feb 9 19:16:22.770489 kubelet[2973]: E0209 19:16:22.769311 2973 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:16:22.770489 kubelet[2973]: E0209 19:16:22.769387 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04f10ca8-89eb-4abe-bab5-af8e8b58a32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pxrcm" podUID=04f10ca8-89eb-4abe-bab5-af8e8b58a32f Feb 9 19:16:22.779755 env[1733]: time="2024-02-09T19:16:22.779649835Z" level=error msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" failed" error="failed to destroy network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.780063 kubelet[2973]: E0209 19:16:22.780028 2973 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:22.780182 kubelet[2973]: E0209 19:16:22.780088 2973 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988} Feb 9 19:16:22.780182 kubelet[2973]: E0209 19:16:22.780149 2973 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8f8906a9-b159-4dc8-b05a-9a8c1edca628\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:16:22.780425 kubelet[2973]: E0209 19:16:22.780209 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8f8906a9-b159-4dc8-b05a-9a8c1edca628\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r2lgn" podUID=8f8906a9-b159-4dc8-b05a-9a8c1edca628 Feb 9 19:16:22.788175 env[1733]: time="2024-02-09T19:16:22.788083901Z" level=error msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" failed" error="failed to destroy network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.788920 kubelet[2973]: E0209 19:16:22.788640 2973 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:22.788920 kubelet[2973]: E0209 19:16:22.788720 2973 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f} Feb 9 19:16:22.788920 kubelet[2973]: E0209 19:16:22.788809 2973 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eb35ee47-58b8-40d7-bda1-e3cee98f51e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:16:22.788920 kubelet[2973]: E0209 19:16:22.788884 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eb35ee47-58b8-40d7-bda1-e3cee98f51e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" podUID=eb35ee47-58b8-40d7-bda1-e3cee98f51e7 Feb 9 19:16:22.799192 env[1733]: time="2024-02-09T19:16:22.799094497Z" level=error msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" failed" error="failed to destroy network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:16:22.799886 kubelet[2973]: E0209 19:16:22.799608 2973 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:22.799886 kubelet[2973]: E0209 19:16:22.799689 2973 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9} Feb 9 19:16:22.799886 kubelet[2973]: E0209 19:16:22.799774 2973 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e04e50e-1216-4f6a-bb2e-33f2f8324b05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:16:22.799886 kubelet[2973]: E0209 19:16:22.799829 2973 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e04e50e-1216-4f6a-bb2e-33f2f8324b05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-47dbl" podUID=3e04e50e-1216-4f6a-bb2e-33f2f8324b05 Feb 9 19:16:22.812376 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988-shm.mount: Deactivated successfully. Feb 9 19:16:22.812562 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f-shm.mount: Deactivated successfully. Feb 9 19:16:22.812700 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9-shm.mount: Deactivated successfully. Feb 9 19:16:23.866303 kubelet[2973]: I0209 19:16:23.865898 2973 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:16:24.008000 audit[4004]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:24.008000 audit[4004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffc45e0fb0 a2=0 a3=ffffb6efd6c0 items=0 ppid=3172 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:24.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:24.011000 audit[4004]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=4004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:24.011000 audit[4004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc45e0fb0 a2=0 a3=ffffb6efd6c0 items=0 ppid=3172 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:24.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:32.557199 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4200389686.mount: Deactivated successfully. Feb 9 19:16:32.660104 env[1733]: time="2024-02-09T19:16:32.660025702Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:32.663512 env[1733]: time="2024-02-09T19:16:32.663450969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:32.666709 env[1733]: time="2024-02-09T19:16:32.666646348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:32.670038 env[1733]: time="2024-02-09T19:16:32.669965575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:32.671346 env[1733]: time="2024-02-09T19:16:32.671293040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 19:16:32.700864 env[1733]: time="2024-02-09T19:16:32.700751581Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:16:32.726967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2339899160.mount: Deactivated successfully. Feb 9 19:16:32.735466 env[1733]: time="2024-02-09T19:16:32.735383091Z" level=info msg="CreateContainer within sandbox \"342d7a1a5a990e05f2f1e66ec5c32e823e29949af4cb3319a2bccc5f1fbda82d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d\"" Feb 9 19:16:32.739064 env[1733]: time="2024-02-09T19:16:32.737361125Z" level=info msg="StartContainer for \"b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d\"" Feb 9 19:16:32.770110 systemd[1]: Started cri-containerd-b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d.scope. Feb 9 19:16:32.820000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.823687 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 19:16:32.823849 kernel: audit: type=1400 audit(1707506192.820:1173): avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.820000 audit[4019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3480 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:32.845853 kernel: audit: type=1300 audit(1707506192.820:1173): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3480 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:32.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656639353337336464643466376634326437646563663862636634 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.868983 kernel: audit: type=1327 audit(1707506192.820:1173): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656639353337336464643466376634326437646563663862636634 Feb 9 19:16:32.869843 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.869941 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.884877 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.885087 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.902133 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.911501 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.921293 kernel: audit: type=1400 audit(1707506192.830:1174): avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.830000 audit: BPF prog-id=148 op=LOAD Feb 9 19:16:32.830000 audit[4019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3480 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:32.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656639353337336464643466376634326437646563663862636634 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.831000 audit: BPF prog-id=149 op=LOAD Feb 9 19:16:32.831000 audit[4019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3480 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:32.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656639353337336464643466376634326437646563663862636634 Feb 9 19:16:32.832000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:16:32.832000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:32.832000 audit: BPF prog-id=150 op=LOAD Feb 9 19:16:32.832000 audit[4019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3480 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:32.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656639353337336464643466376634326437646563663862636634 Feb 9 19:16:32.942859 env[1733]: time="2024-02-09T19:16:32.931515235Z" level=info msg="StartContainer for \"b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d\" returns successfully" Feb 9 19:16:33.064346 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:16:33.064547 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:16:33.479200 env[1733]: time="2024-02-09T19:16:33.479146504Z" level=info msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" Feb 9 19:16:33.727532 systemd[1]: run-containerd-runc-k8s.io-b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d-runc.34in1U.mount: Deactivated successfully. Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.763 [INFO][4078] k8s.go 578: Cleaning up netns ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.763 [INFO][4078] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" iface="eth0" netns="/var/run/netns/cni-8a56b243-3ff6-0609-33df-586a4f5f7507" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.763 [INFO][4078] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" iface="eth0" netns="/var/run/netns/cni-8a56b243-3ff6-0609-33df-586a4f5f7507" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.773 [INFO][4078] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" iface="eth0" netns="/var/run/netns/cni-8a56b243-3ff6-0609-33df-586a4f5f7507" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.773 [INFO][4078] k8s.go 585: Releasing IP address(es) ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.773 [INFO][4078] utils.go 188: Calico CNI releasing IP address ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.850 [INFO][4104] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.850 [INFO][4104] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.855 [INFO][4104] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.871 [WARNING][4104] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.871 [INFO][4104] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.875 [INFO][4104] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:33.880443 env[1733]: 2024-02-09 19:16:33.877 [INFO][4078] k8s.go 591: Teardown processing complete. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:33.885945 systemd[1]: run-netns-cni\x2d8a56b243\x2d3ff6\x2d0609\x2d33df\x2d586a4f5f7507.mount: Deactivated successfully. Feb 9 19:16:33.886764 env[1733]: time="2024-02-09T19:16:33.886705609Z" level=info msg="TearDown network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" successfully" Feb 9 19:16:33.887028 env[1733]: time="2024-02-09T19:16:33.886990024Z" level=info msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" returns successfully" Feb 9 19:16:33.888294 env[1733]: time="2024-02-09T19:16:33.888179111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pxrcm,Uid:04f10ca8-89eb-4abe-bab5-af8e8b58a32f,Namespace:calico-system,Attempt:1,}" Feb 9 19:16:34.122756 (udev-worker)[4053]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:34.127492 systemd-networkd[1536]: calicdf2796b174: Link UP Feb 9 19:16:34.133715 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:16:34.133896 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicdf2796b174: link becomes ready Feb 9 19:16:34.133819 systemd-networkd[1536]: calicdf2796b174: Gained carrier Feb 9 19:16:34.152217 kubelet[2973]: I0209 19:16:34.151392 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-99s8f" podStartSLOduration=-9.223372008703468e+09 pod.CreationTimestamp="2024-02-09 19:16:06 +0000 UTC" firstStartedPulling="2024-02-09 19:16:07.512790856 +0000 UTC m=+22.621398562" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:33.783298646 +0000 UTC m=+48.891906376" watchObservedRunningTime="2024-02-09 19:16:34.151307774 +0000 UTC m=+49.259915504" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:33.971 [INFO][4114] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:33.992 [INFO][4114] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0 csi-node-driver- calico-system 04f10ca8-89eb-4abe-bab5-af8e8b58a32f 686 0 2024-02-09 19:16:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-23-196 csi-node-driver-pxrcm eth0 default [] [] [kns.calico-system ksa.calico-system.default] calicdf2796b174 [] []}} ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:33.993 [INFO][4114] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.045 [INFO][4133] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" HandleID="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.063 [INFO][4133] ipam_plugin.go 268: Auto assigning IP ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" HandleID="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000506f20), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-23-196", "pod":"csi-node-driver-pxrcm", "timestamp":"2024-02-09 19:16:34.045913453 +0000 UTC"}, Hostname:"ip-172-31-23-196", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.063 [INFO][4133] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.064 [INFO][4133] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.064 [INFO][4133] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-196' Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.066 [INFO][4133] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.073 [INFO][4133] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.079 [INFO][4133] ipam.go 489: Trying affinity for 192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.082 [INFO][4133] ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.086 [INFO][4133] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.086 [INFO][4133] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.089 [INFO][4133] ipam.go 1682: Creating new handle: k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.096 [INFO][4133] ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.104 [INFO][4133] ipam.go 1216: Successfully claimed IPs: [192.168.72.65/26] block=192.168.72.64/26 handle="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.104 [INFO][4133] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.65/26] handle="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" host="ip-172-31-23-196" Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.104 [INFO][4133] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:34.158064 env[1733]: 2024-02-09 19:16:34.104 [INFO][4133] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.72.65/26] IPv6=[] ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" HandleID="k8s-pod-network.0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.110 [INFO][4114] k8s.go 385: Populated endpoint ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04f10ca8-89eb-4abe-bab5-af8e8b58a32f", ResourceVersion:"686", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"", Pod:"csi-node-driver-pxrcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicdf2796b174", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.110 [INFO][4114] k8s.go 386: Calico CNI using IPs: [192.168.72.65/32] ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.111 [INFO][4114] dataplane_linux.go 68: Setting the host side veth name to calicdf2796b174 ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.135 [INFO][4114] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.136 [INFO][4114] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04f10ca8-89eb-4abe-bab5-af8e8b58a32f", ResourceVersion:"686", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa", Pod:"csi-node-driver-pxrcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicdf2796b174", MAC:"a6:fb:29:b6:54:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:34.159517 env[1733]: 2024-02-09 19:16:34.153 [INFO][4114] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa" Namespace="calico-system" Pod="csi-node-driver-pxrcm" WorkloadEndpoint="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:34.182659 env[1733]: time="2024-02-09T19:16:34.182542001Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:34.182928 env[1733]: time="2024-02-09T19:16:34.182622506Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:34.182928 env[1733]: time="2024-02-09T19:16:34.182650214Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:34.183700 env[1733]: time="2024-02-09T19:16:34.183317452Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa pid=4160 runtime=io.containerd.runc.v2 Feb 9 19:16:34.207651 systemd[1]: Started cri-containerd-0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa.scope. Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.233000 audit: BPF prog-id=151 op=LOAD Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4160 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066306532366561613639396366633666383632663663313466373136 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4160 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066306532366561613639396366633666383632663663313466373136 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit: BPF prog-id=152 op=LOAD Feb 9 19:16:34.235000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4160 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066306532366561613639396366633666383632663663313466373136 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit: BPF prog-id=153 op=LOAD Feb 9 19:16:34.235000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4160 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066306532366561613639396366633666383632663663313466373136 Feb 9 19:16:34.235000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:16:34.235000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:34.235000 audit: BPF prog-id=154 op=LOAD Feb 9 19:16:34.235000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4160 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066306532366561613639396366633666383632663663313466373136 Feb 9 19:16:34.263698 env[1733]: time="2024-02-09T19:16:34.263641829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pxrcm,Uid:04f10ca8-89eb-4abe-bab5-af8e8b58a32f,Namespace:calico-system,Attempt:1,} returns sandbox id \"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa\"" Feb 9 19:16:34.268665 env[1733]: time="2024-02-09T19:16:34.268606739Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:16:34.477669 env[1733]: time="2024-02-09T19:16:34.476216553Z" level=info msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.561 [INFO][4207] k8s.go 578: Cleaning up netns ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.562 [INFO][4207] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" iface="eth0" netns="/var/run/netns/cni-f6b69eed-f47d-467e-942d-44aa8b812119" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.562 [INFO][4207] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" iface="eth0" netns="/var/run/netns/cni-f6b69eed-f47d-467e-942d-44aa8b812119" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.562 [INFO][4207] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" iface="eth0" netns="/var/run/netns/cni-f6b69eed-f47d-467e-942d-44aa8b812119" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.562 [INFO][4207] k8s.go 585: Releasing IP address(es) ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.563 [INFO][4207] utils.go 188: Calico CNI releasing IP address ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.597 [INFO][4213] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.597 [INFO][4213] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.597 [INFO][4213] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.612 [WARNING][4213] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.613 [INFO][4213] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.623 [INFO][4213] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:34.630065 env[1733]: 2024-02-09 19:16:34.626 [INFO][4207] k8s.go 591: Teardown processing complete. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:34.634160 systemd[1]: run-netns-cni\x2df6b69eed\x2df47d\x2d467e\x2d942d\x2d44aa8b812119.mount: Deactivated successfully. Feb 9 19:16:34.635656 env[1733]: time="2024-02-09T19:16:34.635574078Z" level=info msg="TearDown network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" successfully" Feb 9 19:16:34.635746 env[1733]: time="2024-02-09T19:16:34.635650179Z" level=info msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" returns successfully" Feb 9 19:16:34.636861 env[1733]: time="2024-02-09T19:16:34.636790394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b8b775d-q5f7l,Uid:eb35ee47-58b8-40d7-bda1-e3cee98f51e7,Namespace:calico-system,Attempt:1,}" Feb 9 19:16:34.735144 systemd[1]: run-containerd-runc-k8s.io-b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d-runc.2DN3A1.mount: Deactivated successfully. Feb 9 19:16:34.974116 systemd-networkd[1536]: cali01c74404dc9: Link UP Feb 9 19:16:34.980350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali01c74404dc9: link becomes ready Feb 9 19:16:34.980671 systemd-networkd[1536]: cali01c74404dc9: Gained carrier Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.802 [INFO][4228] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.824 [INFO][4228] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0 calico-kube-controllers-8b8b775d- calico-system eb35ee47-58b8-40d7-bda1-e3cee98f51e7 699 0 2024-02-09 19:16:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8b8b775d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-23-196 calico-kube-controllers-8b8b775d-q5f7l eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali01c74404dc9 [] []}} ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.824 [INFO][4228] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.894 [INFO][4253] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" HandleID="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.914 [INFO][4253] ipam_plugin.go 268: Auto assigning IP ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" HandleID="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001184b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-23-196", "pod":"calico-kube-controllers-8b8b775d-q5f7l", "timestamp":"2024-02-09 19:16:34.89452992 +0000 UTC"}, Hostname:"ip-172-31-23-196", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.914 [INFO][4253] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.914 [INFO][4253] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.914 [INFO][4253] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-196' Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.917 [INFO][4253] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.923 [INFO][4253] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.930 [INFO][4253] ipam.go 489: Trying affinity for 192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.933 [INFO][4253] ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.937 [INFO][4253] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.937 [INFO][4253] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.940 [INFO][4253] ipam.go 1682: Creating new handle: k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6 Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.946 [INFO][4253] ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.955 [INFO][4253] ipam.go 1216: Successfully claimed IPs: [192.168.72.66/26] block=192.168.72.64/26 handle="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.955 [INFO][4253] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.66/26] handle="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" host="ip-172-31-23-196" Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.955 [INFO][4253] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:35.001399 env[1733]: 2024-02-09 19:16:34.956 [INFO][4253] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.72.66/26] IPv6=[] ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" HandleID="k8s-pod-network.cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.959 [INFO][4228] k8s.go 385: Populated endpoint ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0", GenerateName:"calico-kube-controllers-8b8b775d-", Namespace:"calico-system", SelfLink:"", UID:"eb35ee47-58b8-40d7-bda1-e3cee98f51e7", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b8b775d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"", Pod:"calico-kube-controllers-8b8b775d-q5f7l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali01c74404dc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.959 [INFO][4228] k8s.go 386: Calico CNI using IPs: [192.168.72.66/32] ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.959 [INFO][4228] dataplane_linux.go 68: Setting the host side veth name to cali01c74404dc9 ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.982 [INFO][4228] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.982 [INFO][4228] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0", GenerateName:"calico-kube-controllers-8b8b775d-", Namespace:"calico-system", SelfLink:"", UID:"eb35ee47-58b8-40d7-bda1-e3cee98f51e7", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b8b775d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6", Pod:"calico-kube-controllers-8b8b775d-q5f7l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali01c74404dc9", MAC:"82:3a:80:6b:bd:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:35.003159 env[1733]: 2024-02-09 19:16:34.997 [INFO][4228] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6" Namespace="calico-system" Pod="calico-kube-controllers-8b8b775d-q5f7l" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:35.021000 audit[4301]: AVC avc: denied { write } for pid=4301 comm="tee" name="fd" dev="proc" ino=21776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.021000 audit[4301]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1405983 a2=241 a3=1b6 items=1 ppid=4272 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.021000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:16:35.021000 audit: PATH item=0 name="/dev/fd/63" inode=21773 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.034093 env[1733]: time="2024-02-09T19:16:35.033960888Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:35.034093 env[1733]: time="2024-02-09T19:16:35.034053513Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:35.035530 env[1733]: time="2024-02-09T19:16:35.034270562Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:35.035530 env[1733]: time="2024-02-09T19:16:35.034573936Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6 pid=4305 runtime=io.containerd.runc.v2 Feb 9 19:16:35.065758 systemd[1]: Started cri-containerd-cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6.scope. Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.130000 audit: BPF prog-id=155 op=LOAD Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366306134386664616330336331366530623562383535353431356561 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366306134386664616330336331366530623562383535353431356561 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.131000 audit: BPF prog-id=156 op=LOAD Feb 9 19:16:35.131000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366306134386664616330336331366530623562383535353431356561 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.133000 audit: BPF prog-id=157 op=LOAD Feb 9 19:16:35.133000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366306134386664616330336331366530623562383535353431356561 Feb 9 19:16:35.136000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:16:35.136000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:35.136000 audit: BPF prog-id=158 op=LOAD Feb 9 19:16:35.136000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366306134386664616330336331366530623562383535353431356561 Feb 9 19:16:35.186000 audit[4359]: AVC avc: denied { write } for pid=4359 comm="tee" name="fd" dev="proc" ino=21840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.186000 audit[4359]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef35a981 a2=241 a3=1b6 items=1 ppid=4278 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.186000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:16:35.186000 audit: PATH item=0 name="/dev/fd/63" inode=21834 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.186000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.235000 audit[4389]: AVC avc: denied { write } for pid=4389 comm="tee" name="fd" dev="proc" ino=22925 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.237000 audit[4380]: AVC avc: denied { write } for pid=4380 comm="tee" name="fd" dev="proc" ino=22928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.239000 audit[4363]: AVC avc: denied { write } for pid=4363 comm="tee" name="fd" dev="proc" ino=21860 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.239000 audit[4363]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeca0c971 a2=241 a3=1b6 items=1 ppid=4270 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.239000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:16:35.239000 audit: PATH item=0 name="/dev/fd/63" inode=21835 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.245057 env[1733]: time="2024-02-09T19:16:35.244998904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b8b775d-q5f7l,Uid:eb35ee47-58b8-40d7-bda1-e3cee98f51e7,Namespace:calico-system,Attempt:1,} returns sandbox id \"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6\"" Feb 9 19:16:35.235000 audit[4389]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffccb84982 a2=241 a3=1b6 items=1 ppid=4310 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.235000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:16:35.235000 audit: PATH item=0 name="/dev/fd/63" inode=22920 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.261947 systemd-networkd[1536]: calicdf2796b174: Gained IPv6LL Feb 9 19:16:35.237000 audit[4380]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6174981 a2=241 a3=1b6 items=1 ppid=4287 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.237000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:16:35.237000 audit: PATH item=0 name="/dev/fd/63" inode=22918 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.237000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.262000 audit[4386]: AVC avc: denied { write } for pid=4386 comm="tee" name="fd" dev="proc" ino=21864 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.262000 audit[4386]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5dca981 a2=241 a3=1b6 items=1 ppid=4274 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.262000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:16:35.262000 audit: PATH item=0 name="/dev/fd/63" inode=22919 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.262000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:35.265000 audit[4375]: AVC avc: denied { write } for pid=4375 comm="tee" name="fd" dev="proc" ino=21868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:16:35.265000 audit[4375]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd898b972 a2=241 a3=1b6 items=1 ppid=4279 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:35.265000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:16:35.265000 audit: PATH item=0 name="/dev/fd/63" inode=22902 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:35.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit: BPF prog-id=159 op=LOAD Feb 9 19:16:36.085000 audit[4460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5f5cfc8 a2=70 a3=0 items=0 ppid=4288 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:16:36.085000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit: BPF prog-id=160 op=LOAD Feb 9 19:16:36.085000 audit[4460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5f5cfc8 a2=70 a3=4a174c items=0 ppid=4288 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:16:36.085000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:16:36.085000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.085000 audit[4460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff5f5cff8 a2=70 a3=af0173f items=0 ppid=4288 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.086000 audit: BPF prog-id=161 op=LOAD Feb 9 19:16:36.086000 audit[4460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff5f5cf48 a2=70 a3=af01759 items=0 ppid=4288 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.086000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:16:36.091921 (udev-worker)[4143]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:36.101000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.101000 audit[4464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff33d61c8 a2=70 a3=0 items=0 ppid=4288 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:16:36.101000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.101000 audit[4464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff33d60a8 a2=70 a3=2 items=0 ppid=4288 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:16:36.118000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:16:36.246000 audit[4490]: NETFILTER_CFG table=mangle:111 family=2 entries=19 op=nft_register_chain pid=4490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:36.246000 audit[4490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe2970220 a2=0 a3=ffffbcab2fa8 items=0 ppid=4288 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.246000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:36.273000 audit[4489]: NETFILTER_CFG table=raw:112 family=2 entries=19 op=nft_register_chain pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:36.273000 audit[4489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffd49d1d70 a2=0 a3=ffffb065cfa8 items=0 ppid=4288 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.273000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:36.282000 audit[4496]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:36.282000 audit[4496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffd5c643e0 a2=0 a3=ffffb6ca5fa8 items=0 ppid=4288 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:36.296000 audit[4493]: NETFILTER_CFG table=filter:114 family=2 entries=97 op=nft_register_chain pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:36.296000 audit[4493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=52024 a0=3 a1=fffffbe9e7b0 a2=0 a3=ffff8abf1fa8 items=0 ppid=4288 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.296000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:36.479916 env[1733]: time="2024-02-09T19:16:36.477572749Z" level=info msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" Feb 9 19:16:36.491560 env[1733]: time="2024-02-09T19:16:36.491497935Z" level=info msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" Feb 9 19:16:36.542020 systemd-networkd[1536]: cali01c74404dc9: Gained IPv6LL Feb 9 19:16:36.595813 env[1733]: time="2024-02-09T19:16:36.595739937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:36.606769 env[1733]: time="2024-02-09T19:16:36.606700456Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:36.610003 env[1733]: time="2024-02-09T19:16:36.609894257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:36.622278 env[1733]: time="2024-02-09T19:16:36.614774690Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:36.622278 env[1733]: time="2024-02-09T19:16:36.617744985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 19:16:36.623558 env[1733]: time="2024-02-09T19:16:36.623454078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:16:36.626855 env[1733]: time="2024-02-09T19:16:36.626790482Z" level=info msg="CreateContainer within sandbox \"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:16:36.695920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2414653151.mount: Deactivated successfully. Feb 9 19:16:36.702557 env[1733]: time="2024-02-09T19:16:36.702477984Z" level=info msg="CreateContainer within sandbox \"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"388ed88b8f8e00bdebf2debf1a4411ac5eb524ecfed948a4e038afade1ea1ce1\"" Feb 9 19:16:36.705719 env[1733]: time="2024-02-09T19:16:36.703353886Z" level=info msg="StartContainer for \"388ed88b8f8e00bdebf2debf1a4411ac5eb524ecfed948a4e038afade1ea1ce1\"" Feb 9 19:16:36.827361 systemd[1]: run-containerd-runc-k8s.io-388ed88b8f8e00bdebf2debf1a4411ac5eb524ecfed948a4e038afade1ea1ce1-runc.h6Y6Gx.mount: Deactivated successfully. Feb 9 19:16:36.843227 systemd[1]: Started cri-containerd-388ed88b8f8e00bdebf2debf1a4411ac5eb524ecfed948a4e038afade1ea1ce1.scope. Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.665 [INFO][4532] k8s.go 578: Cleaning up netns ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.665 [INFO][4532] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" iface="eth0" netns="/var/run/netns/cni-8cf6848c-e8ee-b764-2be5-9f2a59a3cee2" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.666 [INFO][4532] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" iface="eth0" netns="/var/run/netns/cni-8cf6848c-e8ee-b764-2be5-9f2a59a3cee2" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.666 [INFO][4532] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" iface="eth0" netns="/var/run/netns/cni-8cf6848c-e8ee-b764-2be5-9f2a59a3cee2" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.669 [INFO][4532] k8s.go 585: Releasing IP address(es) ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.669 [INFO][4532] utils.go 188: Calico CNI releasing IP address ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.797 [INFO][4544] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.798 [INFO][4544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.799 [INFO][4544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.839 [WARNING][4544] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.839 [INFO][4544] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.855 [INFO][4544] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:36.870233 env[1733]: 2024-02-09 19:16:36.860 [INFO][4532] k8s.go 591: Teardown processing complete. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:36.874772 (udev-worker)[4468]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:36.879997 systemd-networkd[1536]: vxlan.calico: Link UP Feb 9 19:16:36.880020 systemd-networkd[1536]: vxlan.calico: Gained carrier Feb 9 19:16:36.891298 env[1733]: time="2024-02-09T19:16:36.889523502Z" level=info msg="TearDown network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" successfully" Feb 9 19:16:36.891298 env[1733]: time="2024-02-09T19:16:36.889596028Z" level=info msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" returns successfully" Feb 9 19:16:36.896786 env[1733]: time="2024-02-09T19:16:36.896727450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r2lgn,Uid:8f8906a9-b159-4dc8-b05a-9a8c1edca628,Namespace:kube-system,Attempt:1,}" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.678 [INFO][4531] k8s.go 578: Cleaning up netns ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.678 [INFO][4531] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" iface="eth0" netns="/var/run/netns/cni-ec86affc-e823-54ac-72d7-ad405eddd8d6" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.679 [INFO][4531] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" iface="eth0" netns="/var/run/netns/cni-ec86affc-e823-54ac-72d7-ad405eddd8d6" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.679 [INFO][4531] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" iface="eth0" netns="/var/run/netns/cni-ec86affc-e823-54ac-72d7-ad405eddd8d6" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.685 [INFO][4531] k8s.go 585: Releasing IP address(es) ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.685 [INFO][4531] utils.go 188: Calico CNI releasing IP address ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.806 [INFO][4545] ipam_plugin.go 415: Releasing address using handleID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.807 [INFO][4545] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.856 [INFO][4545] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.908 [WARNING][4545] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.908 [INFO][4545] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.911 [INFO][4545] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:36.916446 env[1733]: 2024-02-09 19:16:36.914 [INFO][4531] k8s.go 591: Teardown processing complete. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:36.922205 env[1733]: time="2024-02-09T19:16:36.922127712Z" level=info msg="TearDown network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" successfully" Feb 9 19:16:36.923831 env[1733]: time="2024-02-09T19:16:36.922413112Z" level=info msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" returns successfully" Feb 9 19:16:36.923831 env[1733]: time="2024-02-09T19:16:36.923762879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-47dbl,Uid:3e04e50e-1216-4f6a-bb2e-33f2f8324b05,Namespace:kube-system,Attempt:1,}" Feb 9 19:16:36.949000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.949000 audit[4560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4160 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338386564383862386638653030626465626632646562663161343431 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.950000 audit: BPF prog-id=162 op=LOAD Feb 9 19:16:36.950000 audit[4560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4160 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338386564383862386638653030626465626632646562663161343431 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.952000 audit: BPF prog-id=163 op=LOAD Feb 9 19:16:36.952000 audit[4560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4160 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338386564383862386638653030626465626632646562663161343431 Feb 9 19:16:36.954000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:16:36.955000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:36.955000 audit: BPF prog-id=164 op=LOAD Feb 9 19:16:36.955000 audit[4560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4160 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:36.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338386564383862386638653030626465626632646562663161343431 Feb 9 19:16:37.020815 env[1733]: time="2024-02-09T19:16:37.020749622Z" level=info msg="StartContainer for \"388ed88b8f8e00bdebf2debf1a4411ac5eb524ecfed948a4e038afade1ea1ce1\" returns successfully" Feb 9 19:16:37.306064 systemd-networkd[1536]: cali2df2a4697b4: Link UP Feb 9 19:16:37.313141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:16:37.313361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2df2a4697b4: link becomes ready Feb 9 19:16:37.313841 systemd-networkd[1536]: cali2df2a4697b4: Gained carrier Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.071 [INFO][4582] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0 coredns-787d4945fb- kube-system 8f8906a9-b159-4dc8-b05a-9a8c1edca628 715 0 2024-02-09 19:15:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-23-196 coredns-787d4945fb-r2lgn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2df2a4697b4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.071 [INFO][4582] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.151 [INFO][4616] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" HandleID="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.184 [INFO][4616] ipam_plugin.go 268: Auto assigning IP ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" HandleID="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-23-196", "pod":"coredns-787d4945fb-r2lgn", "timestamp":"2024-02-09 19:16:37.151788049 +0000 UTC"}, Hostname:"ip-172-31-23-196", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.184 [INFO][4616] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.184 [INFO][4616] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.184 [INFO][4616] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-196' Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.187 [INFO][4616] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.194 [INFO][4616] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.213 [INFO][4616] ipam.go 489: Trying affinity for 192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.217 [INFO][4616] ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.231 [INFO][4616] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.231 [INFO][4616] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.244 [INFO][4616] ipam.go 1682: Creating new handle: k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.265 [INFO][4616] ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.280 [INFO][4616] ipam.go 1216: Successfully claimed IPs: [192.168.72.67/26] block=192.168.72.64/26 handle="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.280 [INFO][4616] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.67/26] handle="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" host="ip-172-31-23-196" Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.280 [INFO][4616] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:37.352779 env[1733]: 2024-02-09 19:16:37.280 [INFO][4616] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.72.67/26] IPv6=[] ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" HandleID="k8s-pod-network.8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.284 [INFO][4582] k8s.go 385: Populated endpoint ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"8f8906a9-b159-4dc8-b05a-9a8c1edca628", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"", Pod:"coredns-787d4945fb-r2lgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2df2a4697b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.284 [INFO][4582] k8s.go 386: Calico CNI using IPs: [192.168.72.67/32] ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.284 [INFO][4582] dataplane_linux.go 68: Setting the host side veth name to cali2df2a4697b4 ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.315 [INFO][4582] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.323 [INFO][4582] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"8f8906a9-b159-4dc8-b05a-9a8c1edca628", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa", Pod:"coredns-787d4945fb-r2lgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2df2a4697b4", MAC:"a2:cb:d7:34:9d:b5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:37.354094 env[1733]: 2024-02-09 19:16:37.350 [INFO][4582] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa" Namespace="kube-system" Pod="coredns-787d4945fb-r2lgn" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:37.387515 env[1733]: time="2024-02-09T19:16:37.387387566Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:37.387883 env[1733]: time="2024-02-09T19:16:37.387802682Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:37.388069 env[1733]: time="2024-02-09T19:16:37.388023308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:37.389353 env[1733]: time="2024-02-09T19:16:37.388768283Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa pid=4647 runtime=io.containerd.runc.v2 Feb 9 19:16:37.441478 systemd[1]: Started cri-containerd-8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa.scope. Feb 9 19:16:37.448780 systemd-networkd[1536]: cali97833278d6d: Link UP Feb 9 19:16:37.455831 systemd-networkd[1536]: cali97833278d6d: Gained carrier Feb 9 19:16:37.456608 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97833278d6d: link becomes ready Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.090 [INFO][4592] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0 coredns-787d4945fb- kube-system 3e04e50e-1216-4f6a-bb2e-33f2f8324b05 716 0 2024-02-09 19:15:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-23-196 coredns-787d4945fb-47dbl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali97833278d6d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.090 [INFO][4592] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.222 [INFO][4622] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" HandleID="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.268 [INFO][4622] ipam_plugin.go 268: Auto assigning IP ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" HandleID="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-23-196", "pod":"coredns-787d4945fb-47dbl", "timestamp":"2024-02-09 19:16:37.222011468 +0000 UTC"}, Hostname:"ip-172-31-23-196", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.268 [INFO][4622] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.287 [INFO][4622] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.288 [INFO][4622] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-196' Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.291 [INFO][4622] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.318 [INFO][4622] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.337 [INFO][4622] ipam.go 489: Trying affinity for 192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.350 [INFO][4622] ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.358 [INFO][4622] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.358 [INFO][4622] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.377 [INFO][4622] ipam.go 1682: Creating new handle: k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9 Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.391 [INFO][4622] ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.405 [INFO][4622] ipam.go 1216: Successfully claimed IPs: [192.168.72.68/26] block=192.168.72.64/26 handle="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.405 [INFO][4622] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.68/26] handle="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" host="ip-172-31-23-196" Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.405 [INFO][4622] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:37.501949 env[1733]: 2024-02-09 19:16:37.405 [INFO][4622] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.72.68/26] IPv6=[] ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" HandleID="k8s-pod-network.65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.415 [INFO][4592] k8s.go 385: Populated endpoint ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3e04e50e-1216-4f6a-bb2e-33f2f8324b05", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"", Pod:"coredns-787d4945fb-47dbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97833278d6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.416 [INFO][4592] k8s.go 386: Calico CNI using IPs: [192.168.72.68/32] ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.416 [INFO][4592] dataplane_linux.go 68: Setting the host side veth name to cali97833278d6d ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.473 [INFO][4592] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.477 [INFO][4592] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3e04e50e-1216-4f6a-bb2e-33f2f8324b05", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9", Pod:"coredns-787d4945fb-47dbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97833278d6d", MAC:"3a:8f:15:4f:42:04", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:37.503687 env[1733]: 2024-02-09 19:16:37.499 [INFO][4592] k8s.go 491: Wrote updated endpoint to datastore ContainerID="65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9" Namespace="kube-system" Pod="coredns-787d4945fb-47dbl" WorkloadEndpoint="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.530000 audit: BPF prog-id=165 op=LOAD Feb 9 19:16:37.532000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.532000 audit[4658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4647 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663434333337376639643861366233383862306333653333613831 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4647 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663434333337376639643861366233383862306333653333613831 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535784 env[1733]: time="2024-02-09T19:16:37.532981874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:16:37.535872 env[1733]: time="2024-02-09T19:16:37.535761990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:16:37.535980 env[1733]: time="2024-02-09T19:16:37.535918561Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:16:37.533000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.533000 audit: BPF prog-id=166 op=LOAD Feb 9 19:16:37.533000 audit[4658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4647 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663434333337376639643861366233383862306333653333613831 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.536889 env[1733]: time="2024-02-09T19:16:37.536366736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9 pid=4693 runtime=io.containerd.runc.v2 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.535000 audit: BPF prog-id=167 op=LOAD Feb 9 19:16:37.535000 audit[4658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4647 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663434333337376639643861366233383862306333653333613831 Feb 9 19:16:37.560000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:16:37.560000 audit: BPF prog-id=166 op=UNLOAD Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.560000 audit: BPF prog-id=168 op=LOAD Feb 9 19:16:37.560000 audit[4658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4647 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861663434333337376639643861366233383862306333653333613831 Feb 9 19:16:37.582303 systemd[1]: Started cri-containerd-65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9.scope. Feb 9 19:16:37.640543 env[1733]: time="2024-02-09T19:16:37.640474505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r2lgn,Uid:8f8906a9-b159-4dc8-b05a-9a8c1edca628,Namespace:kube-system,Attempt:1,} returns sandbox id \"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa\"" Feb 9 19:16:37.646629 env[1733]: time="2024-02-09T19:16:37.646548730Z" level=info msg="CreateContainer within sandbox \"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit: BPF prog-id=169 op=LOAD Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4693 pid=4703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635643966363766363233623230656465303436633638373464656238 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4693 pid=4703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635643966363766363233623230656465303436633638373464656238 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.668000 audit: BPF prog-id=170 op=LOAD Feb 9 19:16:37.668000 audit[4703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4693 pid=4703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635643966363766363233623230656465303436633638373464656238 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit: BPF prog-id=171 op=LOAD Feb 9 19:16:37.669000 audit[4703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4693 pid=4703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635643966363766363233623230656465303436633638373464656238 Feb 9 19:16:37.669000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:16:37.669000 audit: BPF prog-id=170 op=UNLOAD Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { perfmon } for pid=4703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit[4703]: AVC avc: denied { bpf } for pid=4703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.669000 audit: BPF prog-id=172 op=LOAD Feb 9 19:16:37.669000 audit[4703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4693 pid=4703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635643966363766363233623230656465303436633638373464656238 Feb 9 19:16:37.690309 env[1733]: time="2024-02-09T19:16:37.690180207Z" level=info msg="CreateContainer within sandbox \"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d18033acd4e2e8f5324305a7af25b571df0698fefed7f82ba9d688799c78f9d6\"" Feb 9 19:16:37.691527 env[1733]: time="2024-02-09T19:16:37.691468118Z" level=info msg="StartContainer for \"d18033acd4e2e8f5324305a7af25b571df0698fefed7f82ba9d688799c78f9d6\"" Feb 9 19:16:37.696601 systemd[1]: run-netns-cni\x2d8cf6848c\x2de8ee\x2db764\x2d2be5\x2d9f2a59a3cee2.mount: Deactivated successfully. Feb 9 19:16:37.697042 systemd[1]: run-netns-cni\x2dec86affc\x2de823\x2d54ac\x2d72d7\x2dad405eddd8d6.mount: Deactivated successfully. Feb 9 19:16:37.756197 systemd[1]: Started cri-containerd-d18033acd4e2e8f5324305a7af25b571df0698fefed7f82ba9d688799c78f9d6.scope. Feb 9 19:16:37.798371 env[1733]: time="2024-02-09T19:16:37.798232551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-47dbl,Uid:3e04e50e-1216-4f6a-bb2e-33f2f8324b05,Namespace:kube-system,Attempt:1,} returns sandbox id \"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9\"" Feb 9 19:16:37.806205 env[1733]: time="2024-02-09T19:16:37.806131419Z" level=info msg="CreateContainer within sandbox \"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:16:37.842373 env[1733]: time="2024-02-09T19:16:37.842118012Z" level=info msg="CreateContainer within sandbox \"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"23e331884988fdfed841be4b81c9e99684ae9fbd045d0a5c306c6ad0f4de2fe9\"" Feb 9 19:16:37.845534 env[1733]: time="2024-02-09T19:16:37.845457768Z" level=info msg="StartContainer for \"23e331884988fdfed841be4b81c9e99684ae9fbd045d0a5c306c6ad0f4de2fe9\"" Feb 9 19:16:37.860000 audit[4742]: NETFILTER_CFG table=filter:115 family=2 entries=44 op=nft_register_chain pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:37.864853 kernel: kauditd_printk_skb: 400 callbacks suppressed Feb 9 19:16:37.865030 kernel: audit: type=1325 audit(1707506197.860:1277): table=filter:115 family=2 entries=44 op=nft_register_chain pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:37.860000 audit[4742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffee61ac50 a2=0 a3=ffffaa7defa8 items=0 ppid=4288 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.885802 kernel: audit: type=1300 audit(1707506197.860:1277): arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffee61ac50 a2=0 a3=ffffaa7defa8 items=0 ppid=4288 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.915712 kernel: audit: type=1327 audit(1707506197.860:1277): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:37.915866 kernel: audit: type=1400 audit(1707506197.898:1278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.915912 kernel: audit: type=1400 audit(1707506197.898:1279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.922950 kernel: audit: type=1400 audit(1707506197.898:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.934029 systemd[1]: Started cri-containerd-23e331884988fdfed841be4b81c9e99684ae9fbd045d0a5c306c6ad0f4de2fe9.scope. Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.946163 kernel: audit: type=1400 audit(1707506197.898:1281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.956689 kernel: audit: type=1400 audit(1707506197.898:1282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.964787 kernel: audit: type=1400 audit(1707506197.898:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.974173 kernel: audit: type=1400 audit(1707506197.898:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.899000 audit: BPF prog-id=173 op=LOAD Feb 9 19:16:37.899000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.899000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=4647 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431383033336163643465326538663533323433303561376166323562 Feb 9 19:16:37.899000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.899000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=4647 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431383033336163643465326538663533323433303561376166323562 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.900000 audit: BPF prog-id=174 op=LOAD Feb 9 19:16:37.900000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=4647 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431383033336163643465326538663533323433303561376166323562 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit: BPF prog-id=175 op=LOAD Feb 9 19:16:37.901000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=4647 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431383033336163643465326538663533323433303561376166323562 Feb 9 19:16:37.901000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:16:37.901000 audit: BPF prog-id=174 op=UNLOAD Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.901000 audit: BPF prog-id=176 op=LOAD Feb 9 19:16:37.901000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=4647 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431383033336163643465326538663533323433303561376166323562 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.977000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:37.977000 audit: BPF prog-id=180 op=LOAD Feb 9 19:16:37.977000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4693 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233653333313838343938386664666564383431626534623831633965 Feb 9 19:16:38.019563 env[1733]: time="2024-02-09T19:16:38.019485999Z" level=info msg="StartContainer for \"d18033acd4e2e8f5324305a7af25b571df0698fefed7f82ba9d688799c78f9d6\" returns successfully" Feb 9 19:16:38.044398 env[1733]: time="2024-02-09T19:16:38.044239468Z" level=info msg="StartContainer for \"23e331884988fdfed841be4b81c9e99684ae9fbd045d0a5c306c6ad0f4de2fe9\" returns successfully" Feb 9 19:16:38.114000 audit[4804]: NETFILTER_CFG table=filter:116 family=2 entries=38 op=nft_register_chain pid=4804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:16:38.114000 audit[4804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=ffffcfebea50 a2=0 a3=ffff890adfa8 items=0 ppid=4288 pid=4804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:38.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:16:38.334190 systemd-networkd[1536]: vxlan.calico: Gained IPv6LL Feb 9 19:16:38.462958 systemd-networkd[1536]: cali2df2a4697b4: Gained IPv6LL Feb 9 19:16:38.781930 systemd-networkd[1536]: cali97833278d6d: Gained IPv6LL Feb 9 19:16:38.890426 kubelet[2973]: I0209 19:16:38.890138 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-47dbl" podStartSLOduration=39.890056331 pod.CreationTimestamp="2024-02-09 19:15:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:38.857418515 +0000 UTC m=+53.966026245" watchObservedRunningTime="2024-02-09 19:16:38.890056331 +0000 UTC m=+53.998664049" Feb 9 19:16:38.955647 kubelet[2973]: I0209 19:16:38.955578 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-r2lgn" podStartSLOduration=39.955518689 pod.CreationTimestamp="2024-02-09 19:15:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:38.923004458 +0000 UTC m=+54.031612188" watchObservedRunningTime="2024-02-09 19:16:38.955518689 +0000 UTC m=+54.064126407" Feb 9 19:16:39.114000 audit[4841]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:39.114000 audit[4841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffd559abc0 a2=0 a3=ffff8aac86c0 items=0 ppid=3172 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:39.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:39.119000 audit[4841]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:39.119000 audit[4841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffd559abc0 a2=0 a3=ffff8aac86c0 items=0 ppid=3172 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:39.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:39.244000 audit[4867]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:39.244000 audit[4867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffecc199a0 a2=0 a3=ffff9008b6c0 items=0 ppid=3172 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:39.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:39.255000 audit[4867]: NETFILTER_CFG table=nat:120 family=2 entries=63 op=nft_register_chain pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:16:39.255000 audit[4867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffecc199a0 a2=0 a3=ffff9008b6c0 items=0 ppid=3172 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:39.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:16:40.837000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:40.837000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:40.837000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40047ff920 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:40.837000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:40.837000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400467a7b0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:40.837000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:40.847000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:40.847000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009b28210 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:40.847000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:40.857000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:40.857000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4001779020 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:40.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:41.124000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:41.124000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4003eb3a40 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:41.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:41.124000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:41.124000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400a802c60 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:16:41.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:16:41.162733 env[1733]: time="2024-02-09T19:16:41.162679641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:41.166532 env[1733]: time="2024-02-09T19:16:41.166467505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:41.170298 env[1733]: time="2024-02-09T19:16:41.169164847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:41.172940 env[1733]: time="2024-02-09T19:16:41.172887445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:41.174128 env[1733]: time="2024-02-09T19:16:41.174082424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 19:16:41.176474 env[1733]: time="2024-02-09T19:16:41.176415360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:16:41.205671 env[1733]: time="2024-02-09T19:16:41.205578852Z" level=info msg="CreateContainer within sandbox \"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:16:41.239026 env[1733]: time="2024-02-09T19:16:41.238938691Z" level=info msg="CreateContainer within sandbox \"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e\"" Feb 9 19:16:41.240384 env[1733]: time="2024-02-09T19:16:41.240315514Z" level=info msg="StartContainer for \"f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e\"" Feb 9 19:16:41.301681 systemd[1]: Started cri-containerd-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e.scope. Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.374000 audit: BPF prog-id=181 op=LOAD Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4305 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:41.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630396561616166373331393836663866333961336135616438343562 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4305 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:41.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630396561616166373331393836663866333961336135616438343562 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit: BPF prog-id=182 op=LOAD Feb 9 19:16:41.376000 audit[4880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4305 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:41.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630396561616166373331393836663866333961336135616438343562 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit: BPF prog-id=183 op=LOAD Feb 9 19:16:41.376000 audit[4880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4305 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:41.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630396561616166373331393836663866333961336135616438343562 Feb 9 19:16:41.376000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:16:41.376000 audit: BPF prog-id=182 op=UNLOAD Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:41.376000 audit: BPF prog-id=184 op=LOAD Feb 9 19:16:41.376000 audit[4880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4305 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:41.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630396561616166373331393836663866333961336135616438343562 Feb 9 19:16:41.462361 env[1733]: time="2024-02-09T19:16:41.461891219Z" level=info msg="StartContainer for \"f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e\" returns successfully" Feb 9 19:16:41.997586 kubelet[2973]: I0209 19:16:41.997521 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8b8b775d-q5f7l" podStartSLOduration=-9.223372001857311e+09 pod.CreationTimestamp="2024-02-09 19:16:07 +0000 UTC" firstStartedPulling="2024-02-09 19:16:35.247422061 +0000 UTC m=+50.356029779" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:41.870896379 +0000 UTC m=+56.979504145" watchObservedRunningTime="2024-02-09 19:16:41.997463933 +0000 UTC m=+57.106071651" Feb 9 19:16:42.434000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:42.434000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014e0540 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:42.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:42.434000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:42.434000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001afa0c0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:42.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:43.154623 env[1733]: time="2024-02-09T19:16:43.154549921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:43.158224 env[1733]: time="2024-02-09T19:16:43.158152469Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:43.161095 env[1733]: time="2024-02-09T19:16:43.161013037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:43.164335 env[1733]: time="2024-02-09T19:16:43.164279485Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:43.165305 env[1733]: time="2024-02-09T19:16:43.165219352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 19:16:43.169356 env[1733]: time="2024-02-09T19:16:43.169246366Z" level=info msg="CreateContainer within sandbox \"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:16:43.201668 env[1733]: time="2024-02-09T19:16:43.201578125Z" level=info msg="CreateContainer within sandbox \"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"988803850aba90cc6b7808b829c2bec0ab6e7215c2be179f9484a8cd1d6efad7\"" Feb 9 19:16:43.202839 env[1733]: time="2024-02-09T19:16:43.202695108Z" level=info msg="StartContainer for \"988803850aba90cc6b7808b829c2bec0ab6e7215c2be179f9484a8cd1d6efad7\"" Feb 9 19:16:43.273312 systemd[1]: run-containerd-runc-k8s.io-988803850aba90cc6b7808b829c2bec0ab6e7215c2be179f9484a8cd1d6efad7-runc.5cKkXo.mount: Deactivated successfully. Feb 9 19:16:43.282812 systemd[1]: Started cri-containerd-988803850aba90cc6b7808b829c2bec0ab6e7215c2be179f9484a8cd1d6efad7.scope. Feb 9 19:16:43.350196 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 9 19:16:43.350454 kernel: audit: type=1400 audit(1707506203.334:1337): avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.350525 kernel: audit: type=1300 audit(1707506203.334:1337): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4160 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4160 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383830333835306162613930636336623738303862383239633262 Feb 9 19:16:43.365794 kernel: audit: type=1327 audit(1707506203.334:1337): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383830333835306162613930636336623738303862383239633262 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.376538 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.391635 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.407642 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.417403 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.426943 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.435466 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.444243 kernel: audit: type=1400 audit(1707506203.334:1338): avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.446388 env[1733]: time="2024-02-09T19:16:43.446319567Z" level=info msg="StartContainer for \"988803850aba90cc6b7808b829c2bec0ab6e7215c2be179f9484a8cd1d6efad7\" returns successfully" Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.334000 audit: BPF prog-id=185 op=LOAD Feb 9 19:16:43.334000 audit[4943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4160 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383830333835306162613930636336623738303862383239633262 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.336000 audit: BPF prog-id=186 op=LOAD Feb 9 19:16:43.336000 audit[4943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4160 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383830333835306162613930636336623738303862383239633262 Feb 9 19:16:43.350000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:16:43.351000 audit: BPF prog-id=185 op=UNLOAD Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { perfmon } for pid=4943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit[4943]: AVC avc: denied { bpf } for pid=4943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:43.351000 audit: BPF prog-id=187 op=LOAD Feb 9 19:16:43.351000 audit[4943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4160 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383830333835306162613930636336623738303862383239633262 Feb 9 19:16:44.464941 kubelet[2973]: I0209 19:16:44.464906 2973 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:16:44.465652 kubelet[2973]: I0209 19:16:44.465627 2973 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:16:45.100424 env[1733]: time="2024-02-09T19:16:45.099739998Z" level=info msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.168 [WARNING][4985] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04f10ca8-89eb-4abe-bab5-af8e8b58a32f", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa", Pod:"csi-node-driver-pxrcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicdf2796b174", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.169 [INFO][4985] k8s.go 578: Cleaning up netns ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.169 [INFO][4985] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" iface="eth0" netns="" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.169 [INFO][4985] k8s.go 585: Releasing IP address(es) ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.169 [INFO][4985] utils.go 188: Calico CNI releasing IP address ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.215 [INFO][4991] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.215 [INFO][4991] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.216 [INFO][4991] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.229 [WARNING][4991] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.229 [INFO][4991] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.232 [INFO][4991] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:45.236191 env[1733]: 2024-02-09 19:16:45.234 [INFO][4985] k8s.go 591: Teardown processing complete. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.237321 env[1733]: time="2024-02-09T19:16:45.237217538Z" level=info msg="TearDown network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" successfully" Feb 9 19:16:45.237469 env[1733]: time="2024-02-09T19:16:45.237436042Z" level=info msg="StopPodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" returns successfully" Feb 9 19:16:45.238343 env[1733]: time="2024-02-09T19:16:45.238295033Z" level=info msg="RemovePodSandbox for \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" Feb 9 19:16:45.238706 env[1733]: time="2024-02-09T19:16:45.238622026Z" level=info msg="Forcibly stopping sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\"" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.301 [WARNING][5009] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04f10ca8-89eb-4abe-bab5-af8e8b58a32f", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"0f0e26eaa699cfc6f862f6c14f7169181d3fac2263b0b4ec1eddbc1db88ae0aa", Pod:"csi-node-driver-pxrcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicdf2796b174", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.302 [INFO][5009] k8s.go 578: Cleaning up netns ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.302 [INFO][5009] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" iface="eth0" netns="" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.302 [INFO][5009] k8s.go 585: Releasing IP address(es) ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.302 [INFO][5009] utils.go 188: Calico CNI releasing IP address ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.351 [INFO][5017] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.352 [INFO][5017] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.352 [INFO][5017] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.369 [WARNING][5017] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.369 [INFO][5017] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" HandleID="k8s-pod-network.26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Workload="ip--172--31--23--196-k8s-csi--node--driver--pxrcm-eth0" Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.374 [INFO][5017] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:45.379423 env[1733]: 2024-02-09 19:16:45.376 [INFO][5009] k8s.go 591: Teardown processing complete. ContainerID="26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4" Feb 9 19:16:45.383878 env[1733]: time="2024-02-09T19:16:45.383818542Z" level=info msg="TearDown network for sandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" successfully" Feb 9 19:16:45.389158 env[1733]: time="2024-02-09T19:16:45.389090419Z" level=info msg="RemovePodSandbox \"26c91d37292c58727a708e10d5e46f980aadd4eb9724a9f05704da2a946fcef4\" returns successfully" Feb 9 19:16:45.390121 env[1733]: time="2024-02-09T19:16:45.390077135Z" level=info msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.461 [WARNING][5036] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"8f8906a9-b159-4dc8-b05a-9a8c1edca628", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa", Pod:"coredns-787d4945fb-r2lgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2df2a4697b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.461 [INFO][5036] k8s.go 578: Cleaning up netns ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.461 [INFO][5036] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" iface="eth0" netns="" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.461 [INFO][5036] k8s.go 585: Releasing IP address(es) ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.462 [INFO][5036] utils.go 188: Calico CNI releasing IP address ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.514 [INFO][5043] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.517 [INFO][5043] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.517 [INFO][5043] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.531 [WARNING][5043] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.531 [INFO][5043] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.533 [INFO][5043] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:45.538328 env[1733]: 2024-02-09 19:16:45.536 [INFO][5036] k8s.go 591: Teardown processing complete. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.539417 env[1733]: time="2024-02-09T19:16:45.539367331Z" level=info msg="TearDown network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" successfully" Feb 9 19:16:45.539584 env[1733]: time="2024-02-09T19:16:45.539551492Z" level=info msg="StopPodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" returns successfully" Feb 9 19:16:45.540540 env[1733]: time="2024-02-09T19:16:45.540488985Z" level=info msg="RemovePodSandbox for \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" Feb 9 19:16:45.540716 env[1733]: time="2024-02-09T19:16:45.540552739Z" level=info msg="Forcibly stopping sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\"" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.607 [WARNING][5062] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"8f8906a9-b159-4dc8-b05a-9a8c1edca628", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"8af443377f9d8a6b388b0c3e33a81e20e8c2b0b18358a5caa1bf2642157d3eaa", Pod:"coredns-787d4945fb-r2lgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2df2a4697b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.607 [INFO][5062] k8s.go 578: Cleaning up netns ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.607 [INFO][5062] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" iface="eth0" netns="" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.607 [INFO][5062] k8s.go 585: Releasing IP address(es) ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.608 [INFO][5062] utils.go 188: Calico CNI releasing IP address ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.645 [INFO][5068] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.645 [INFO][5068] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.645 [INFO][5068] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.666 [WARNING][5068] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.667 [INFO][5068] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" HandleID="k8s-pod-network.4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--r2lgn-eth0" Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.669 [INFO][5068] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:45.674612 env[1733]: 2024-02-09 19:16:45.671 [INFO][5062] k8s.go 591: Teardown processing complete. ContainerID="4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988" Feb 9 19:16:45.675862 env[1733]: time="2024-02-09T19:16:45.675811152Z" level=info msg="TearDown network for sandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" successfully" Feb 9 19:16:45.682739 env[1733]: time="2024-02-09T19:16:45.682647654Z" level=info msg="RemovePodSandbox \"4e3d865c03a900f93db8a880b57b050b6363b3101964f7c3c79f4cf27cdaa988\" returns successfully" Feb 9 19:16:45.683607 env[1733]: time="2024-02-09T19:16:45.683555747Z" level=info msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.761 [WARNING][5086] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3e04e50e-1216-4f6a-bb2e-33f2f8324b05", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9", Pod:"coredns-787d4945fb-47dbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97833278d6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.761 [INFO][5086] k8s.go 578: Cleaning up netns ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.761 [INFO][5086] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" iface="eth0" netns="" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.761 [INFO][5086] k8s.go 585: Releasing IP address(es) ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.761 [INFO][5086] utils.go 188: Calico CNI releasing IP address ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.852 [INFO][5093] ipam_plugin.go 415: Releasing address using handleID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.852 [INFO][5093] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.853 [INFO][5093] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.869 [WARNING][5093] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.869 [INFO][5093] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.873 [INFO][5093] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:45.877927 env[1733]: 2024-02-09 19:16:45.875 [INFO][5086] k8s.go 591: Teardown processing complete. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:45.878876 env[1733]: time="2024-02-09T19:16:45.878009944Z" level=info msg="TearDown network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" successfully" Feb 9 19:16:45.878876 env[1733]: time="2024-02-09T19:16:45.878056503Z" level=info msg="StopPodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" returns successfully" Feb 9 19:16:45.879583 env[1733]: time="2024-02-09T19:16:45.879521182Z" level=info msg="RemovePodSandbox for \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" Feb 9 19:16:45.879731 env[1733]: time="2024-02-09T19:16:45.879582392Z" level=info msg="Forcibly stopping sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\"" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.948 [WARNING][5113] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3e04e50e-1216-4f6a-bb2e-33f2f8324b05", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 15, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"65d9f67f623b20ede046c6874deb8d1cb3e3bf25d75458c7d05433b76b902fd9", Pod:"coredns-787d4945fb-47dbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali97833278d6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.948 [INFO][5113] k8s.go 578: Cleaning up netns ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.948 [INFO][5113] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" iface="eth0" netns="" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.948 [INFO][5113] k8s.go 585: Releasing IP address(es) ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.948 [INFO][5113] utils.go 188: Calico CNI releasing IP address ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.983 [INFO][5120] ipam_plugin.go 415: Releasing address using handleID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.983 [INFO][5120] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:45.983 [INFO][5120] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:46.006 [WARNING][5120] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:46.007 [INFO][5120] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" HandleID="k8s-pod-network.ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Workload="ip--172--31--23--196-k8s-coredns--787d4945fb--47dbl-eth0" Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:46.010 [INFO][5120] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:46.015064 env[1733]: 2024-02-09 19:16:46.012 [INFO][5113] k8s.go 591: Teardown processing complete. ContainerID="ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9" Feb 9 19:16:46.016461 env[1733]: time="2024-02-09T19:16:46.015029970Z" level=info msg="TearDown network for sandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" successfully" Feb 9 19:16:46.022007 env[1733]: time="2024-02-09T19:16:46.021940181Z" level=info msg="RemovePodSandbox \"ce94a8f51ac05c87152906e2304ac5435a48e7f6c3531df47d1f6b3323d372b9\" returns successfully" Feb 9 19:16:46.024054 env[1733]: time="2024-02-09T19:16:46.024003073Z" level=info msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.105 [WARNING][5138] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0", GenerateName:"calico-kube-controllers-8b8b775d-", Namespace:"calico-system", SelfLink:"", UID:"eb35ee47-58b8-40d7-bda1-e3cee98f51e7", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b8b775d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6", Pod:"calico-kube-controllers-8b8b775d-q5f7l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali01c74404dc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.106 [INFO][5138] k8s.go 578: Cleaning up netns ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.106 [INFO][5138] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" iface="eth0" netns="" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.106 [INFO][5138] k8s.go 585: Releasing IP address(es) ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.106 [INFO][5138] utils.go 188: Calico CNI releasing IP address ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.143 [INFO][5144] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.143 [INFO][5144] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.143 [INFO][5144] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.158 [WARNING][5144] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.158 [INFO][5144] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.160 [INFO][5144] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:46.164959 env[1733]: 2024-02-09 19:16:46.162 [INFO][5138] k8s.go 591: Teardown processing complete. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.166417 env[1733]: time="2024-02-09T19:16:46.166364668Z" level=info msg="TearDown network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" successfully" Feb 9 19:16:46.166568 env[1733]: time="2024-02-09T19:16:46.166531585Z" level=info msg="StopPodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" returns successfully" Feb 9 19:16:46.167230 env[1733]: time="2024-02-09T19:16:46.167185740Z" level=info msg="RemovePodSandbox for \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" Feb 9 19:16:46.167621 env[1733]: time="2024-02-09T19:16:46.167471239Z" level=info msg="Forcibly stopping sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\"" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.234 [WARNING][5162] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0", GenerateName:"calico-kube-controllers-8b8b775d-", Namespace:"calico-system", SelfLink:"", UID:"eb35ee47-58b8-40d7-bda1-e3cee98f51e7", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b8b775d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"cf0a48fdac03c16e0b5b8555415ea76e4955655a549ed662a95ab0d9743d14f6", Pod:"calico-kube-controllers-8b8b775d-q5f7l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali01c74404dc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.234 [INFO][5162] k8s.go 578: Cleaning up netns ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.234 [INFO][5162] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" iface="eth0" netns="" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.234 [INFO][5162] k8s.go 585: Releasing IP address(es) ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.234 [INFO][5162] utils.go 188: Calico CNI releasing IP address ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.273 [INFO][5168] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.274 [INFO][5168] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.274 [INFO][5168] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.289 [WARNING][5168] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.289 [INFO][5168] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" HandleID="k8s-pod-network.ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Workload="ip--172--31--23--196-k8s-calico--kube--controllers--8b8b775d--q5f7l-eth0" Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.291 [INFO][5168] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:16:46.296708 env[1733]: 2024-02-09 19:16:46.294 [INFO][5162] k8s.go 591: Teardown processing complete. ContainerID="ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f" Feb 9 19:16:46.297977 env[1733]: time="2024-02-09T19:16:46.297913706Z" level=info msg="TearDown network for sandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" successfully" Feb 9 19:16:46.303168 env[1733]: time="2024-02-09T19:16:46.303110889Z" level=info msg="RemovePodSandbox \"ac9a0b24336e9f9a748af92afd05664c70aab91f97980a11363cd476a526410f\" returns successfully" Feb 9 19:16:48.598664 kubelet[2973]: I0209 19:16:48.598621 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-pxrcm" podStartSLOduration=-9.223371994256208e+09 pod.CreationTimestamp="2024-02-09 19:16:06 +0000 UTC" firstStartedPulling="2024-02-09 19:16:34.266042735 +0000 UTC m=+49.374650441" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:16:43.880974072 +0000 UTC m=+58.989581814" watchObservedRunningTime="2024-02-09 19:16:48.598567144 +0000 UTC m=+63.707174850" Feb 9 19:16:48.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.23.196:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:48.887947 systemd[1]: Started sshd@7-172.31.23.196:22-147.75.109.163:49506.service. Feb 9 19:16:48.890346 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 19:16:48.890478 kernel: audit: type=1130 audit(1707506208.887:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.23.196:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.079000 audit[5210]: USER_ACCT pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.084011 sshd[5210]: Accepted publickey for core from 147.75.109.163 port 49506 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:49.088166 sshd[5210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:49.080000 audit[5210]: CRED_ACQ pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.102323 kernel: audit: type=1101 audit(1707506209.079:1344): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.102475 kernel: audit: type=1103 audit(1707506209.080:1345): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.110896 kernel: audit: type=1006 audit(1707506209.080:1346): pid=5210 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 19:16:49.080000 audit[5210]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc362fb50 a2=3 a3=1 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:49.117822 systemd[1]: Started session-8.scope. Feb 9 19:16:49.121955 kernel: audit: type=1300 audit(1707506209.080:1346): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc362fb50 a2=3 a3=1 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:49.123118 systemd-logind[1721]: New session 8 of user core. Feb 9 19:16:49.124421 kernel: audit: type=1327 audit(1707506209.080:1346): proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:49.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:49.134000 audit[5210]: USER_START pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.134000 audit[5212]: CRED_ACQ pid=5212 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.155894 kernel: audit: type=1105 audit(1707506209.134:1347): pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.156052 kernel: audit: type=1103 audit(1707506209.134:1348): pid=5212 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.430803 sshd[5210]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:49.431000 audit[5210]: USER_END pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.436286 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:16:49.437879 systemd[1]: sshd@7-172.31.23.196:22-147.75.109.163:49506.service: Deactivated successfully. Feb 9 19:16:49.432000 audit[5210]: CRED_DISP pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.445398 kernel: audit: type=1106 audit(1707506209.431:1349): pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.454419 systemd-logind[1721]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:16:49.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.23.196:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.456461 kernel: audit: type=1104 audit(1707506209.432:1350): pid=5210 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.456107 systemd-logind[1721]: Removed session 8. Feb 9 19:16:51.068366 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.GmUEQI.mount: Deactivated successfully. Feb 9 19:16:54.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.196:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:54.462340 systemd[1]: Started sshd@8-172.31.23.196:22-147.75.109.163:60512.service. Feb 9 19:16:54.464696 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:16:54.464784 kernel: audit: type=1130 audit(1707506214.461:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.196:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:54.641000 audit[5262]: USER_ACCT pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.642658 sshd[5262]: Accepted publickey for core from 147.75.109.163 port 60512 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:54.656032 sshd[5262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:54.653000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.666061 kernel: audit: type=1101 audit(1707506214.641:1353): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.666202 kernel: audit: type=1103 audit(1707506214.653:1354): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.672909 kernel: audit: type=1006 audit(1707506214.653:1355): pid=5262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 19:16:54.653000 audit[5262]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed80a040 a2=3 a3=1 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:54.679405 systemd-logind[1721]: New session 9 of user core. Feb 9 19:16:54.681105 systemd[1]: Started session-9.scope. Feb 9 19:16:54.653000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:54.691695 kernel: audit: type=1300 audit(1707506214.653:1355): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed80a040 a2=3 a3=1 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:54.691828 kernel: audit: type=1327 audit(1707506214.653:1355): proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:54.695000 audit[5262]: USER_START pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.698000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.710361 kernel: audit: type=1105 audit(1707506214.695:1356): pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.722307 kernel: audit: type=1103 audit(1707506214.698:1357): pid=5264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.948632 sshd[5262]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:54.949000 audit[5262]: USER_END pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.963891 systemd[1]: sshd@8-172.31.23.196:22-147.75.109.163:60512.service: Deactivated successfully. Feb 9 19:16:54.949000 audit[5262]: CRED_DISP pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.964367 kernel: audit: type=1106 audit(1707506214.949:1358): pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:54.965323 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:16:54.967285 systemd-logind[1721]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:16:54.969220 systemd-logind[1721]: Removed session 9. Feb 9 19:16:54.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.196:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:54.975332 kernel: audit: type=1104 audit(1707506214.949:1359): pid=5262 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:58.556000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:58.556000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d2a5c0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:58.556000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:58.560000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:58.560000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d2a840 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:58.560000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:58.563000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:58.563000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d2a880 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:58.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:58.565000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:16:58.565000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d2a9e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:16:58.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:16:59.995165 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:16:59.995349 kernel: audit: type=1130 audit(1707506219.988:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.196:22-147.75.109.163:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:59.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.196:22-147.75.109.163:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:59.989328 systemd[1]: Started sshd@9-172.31.23.196:22-147.75.109.163:60522.service. Feb 9 19:17:00.176079 sshd[5286]: Accepted publickey for core from 147.75.109.163 port 60522 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:00.174000 audit[5286]: USER_ACCT pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.186000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.188114 sshd[5286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:00.196734 kernel: audit: type=1101 audit(1707506220.174:1366): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.196872 kernel: audit: type=1103 audit(1707506220.186:1367): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.203570 kernel: audit: type=1006 audit(1707506220.186:1368): pid=5286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:17:00.186000 audit[5286]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9ab30c0 a2=3 a3=1 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:00.205459 kernel: audit: type=1300 audit(1707506220.186:1368): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9ab30c0 a2=3 a3=1 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:00.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:00.219162 kernel: audit: type=1327 audit(1707506220.186:1368): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:00.221376 systemd-logind[1721]: New session 10 of user core. Feb 9 19:17:00.223429 systemd[1]: Started session-10.scope. Feb 9 19:17:00.231000 audit[5286]: USER_START pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.234000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.253529 kernel: audit: type=1105 audit(1707506220.231:1369): pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.253652 kernel: audit: type=1103 audit(1707506220.234:1370): pid=5288 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.476858 sshd[5286]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:00.477000 audit[5286]: USER_END pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.484329 systemd-logind[1721]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:17:00.487025 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:17:00.489195 systemd-logind[1721]: Removed session 10. Feb 9 19:17:00.477000 audit[5286]: CRED_DISP pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.491090 systemd[1]: sshd@9-172.31.23.196:22-147.75.109.163:60522.service: Deactivated successfully. Feb 9 19:17:00.499828 kernel: audit: type=1106 audit(1707506220.477:1371): pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.500012 kernel: audit: type=1104 audit(1707506220.477:1372): pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:00.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.196:22-147.75.109.163:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:05.504550 systemd[1]: Started sshd@10-172.31.23.196:22-147.75.109.163:51590.service. Feb 9 19:17:05.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.196:22-147.75.109.163:51590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:05.513414 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:17:05.513523 kernel: audit: type=1130 audit(1707506225.511:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.196:22-147.75.109.163:51590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:05.679000 audit[5301]: USER_ACCT pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.679749 sshd[5301]: Accepted publickey for core from 147.75.109.163 port 51590 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:05.690322 kernel: audit: type=1101 audit(1707506225.679:1375): pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.691000 audit[5301]: CRED_ACQ pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.696875 sshd[5301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:05.707931 kernel: audit: type=1103 audit(1707506225.691:1376): pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.708042 kernel: audit: type=1006 audit(1707506225.691:1377): pid=5301 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:17:05.691000 audit[5301]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde2dfe00 a2=3 a3=1 items=0 ppid=1 pid=5301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.718632 kernel: audit: type=1300 audit(1707506225.691:1377): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde2dfe00 a2=3 a3=1 items=0 ppid=1 pid=5301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.691000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:05.723513 kernel: audit: type=1327 audit(1707506225.691:1377): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:05.726028 systemd-logind[1721]: New session 11 of user core. Feb 9 19:17:05.727362 systemd[1]: Started session-11.scope. Feb 9 19:17:05.736000 audit[5301]: USER_START pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.748000 audit[5303]: CRED_ACQ pid=5303 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.758019 kernel: audit: type=1105 audit(1707506225.736:1378): pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:05.758123 kernel: audit: type=1103 audit(1707506225.748:1379): pid=5303 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:06.003599 sshd[5301]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:06.005000 audit[5301]: USER_END pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:06.009243 systemd-logind[1721]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:17:06.011279 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:17:06.013200 systemd-logind[1721]: Removed session 11. Feb 9 19:17:06.014477 systemd[1]: sshd@10-172.31.23.196:22-147.75.109.163:51590.service: Deactivated successfully. Feb 9 19:17:06.006000 audit[5301]: CRED_DISP pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:06.026061 kernel: audit: type=1106 audit(1707506226.005:1380): pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:06.026163 kernel: audit: type=1104 audit(1707506226.006:1381): pid=5301 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:06.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.196:22-147.75.109.163:51590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:11.040536 systemd[1]: Started sshd@11-172.31.23.196:22-147.75.109.163:51604.service. Feb 9 19:17:11.044530 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:17:11.044643 kernel: audit: type=1130 audit(1707506231.040:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.196:22-147.75.109.163:51604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:11.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.196:22-147.75.109.163:51604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:11.223362 sshd[5316]: Accepted publickey for core from 147.75.109.163 port 51604 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:11.222000 audit[5316]: USER_ACCT pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.234490 sshd[5316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:11.233000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.245554 kernel: audit: type=1101 audit(1707506231.222:1384): pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.245690 kernel: audit: type=1103 audit(1707506231.233:1385): pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.252438 kernel: audit: type=1006 audit(1707506231.233:1386): pid=5316 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:17:11.233000 audit[5316]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5e37ff0 a2=3 a3=1 items=0 ppid=1 pid=5316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:11.263972 kernel: audit: type=1300 audit(1707506231.233:1386): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5e37ff0 a2=3 a3=1 items=0 ppid=1 pid=5316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:11.263343 systemd-logind[1721]: New session 12 of user core. Feb 9 19:17:11.265653 systemd[1]: Started session-12.scope. Feb 9 19:17:11.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:11.275675 kernel: audit: type=1327 audit(1707506231.233:1386): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:11.280000 audit[5316]: USER_START pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.281000 audit[5318]: CRED_ACQ pid=5318 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.301506 kernel: audit: type=1105 audit(1707506231.280:1387): pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.301698 kernel: audit: type=1103 audit(1707506231.281:1388): pid=5318 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.530873 sshd[5316]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:11.533000 audit[5316]: USER_END pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.537806 systemd-logind[1721]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:17:11.539394 systemd[1]: sshd@11-172.31.23.196:22-147.75.109.163:51604.service: Deactivated successfully. Feb 9 19:17:11.540755 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:17:11.542994 systemd-logind[1721]: Removed session 12. Feb 9 19:17:11.533000 audit[5316]: CRED_DISP pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.555797 kernel: audit: type=1106 audit(1707506231.533:1389): pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.555980 kernel: audit: type=1104 audit(1707506231.533:1390): pid=5316 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.196:22-147.75.109.163:51604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:11.574031 systemd[1]: Started sshd@12-172.31.23.196:22-147.75.109.163:51614.service. Feb 9 19:17:11.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.23.196:22-147.75.109.163:51614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:11.744000 audit[5329]: USER_ACCT pid=5329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.745032 sshd[5329]: Accepted publickey for core from 147.75.109.163 port 51614 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:11.746000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.746000 audit[5329]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe838fe20 a2=3 a3=1 items=0 ppid=1 pid=5329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:11.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:11.747974 sshd[5329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:11.757230 systemd[1]: Started session-13.scope. Feb 9 19:17:11.758075 systemd-logind[1721]: New session 13 of user core. Feb 9 19:17:11.767000 audit[5329]: USER_START pid=5329 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:11.770000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:13.971531 sshd[5329]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:13.973000 audit[5329]: USER_END pid=5329 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:13.973000 audit[5329]: CRED_DISP pid=5329 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:13.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.23.196:22-147.75.109.163:51614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:13.977573 systemd[1]: sshd@12-172.31.23.196:22-147.75.109.163:51614.service: Deactivated successfully. Feb 9 19:17:13.979140 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:17:13.986092 systemd-logind[1721]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:17:14.002050 systemd-logind[1721]: Removed session 13. Feb 9 19:17:14.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.23.196:22-147.75.109.163:51620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:14.011999 systemd[1]: Started sshd@13-172.31.23.196:22-147.75.109.163:51620.service. Feb 9 19:17:14.198491 sshd[5339]: Accepted publickey for core from 147.75.109.163 port 51620 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:14.198000 audit[5339]: USER_ACCT pid=5339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.199000 audit[5339]: CRED_ACQ pid=5339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.200000 audit[5339]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddf3fae0 a2=3 a3=1 items=0 ppid=1 pid=5339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:14.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:14.201866 sshd[5339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:14.212698 systemd-logind[1721]: New session 14 of user core. Feb 9 19:17:14.213626 systemd[1]: Started session-14.scope. Feb 9 19:17:14.225000 audit[5339]: USER_START pid=5339 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.230000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.470618 sshd[5339]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:14.473000 audit[5339]: USER_END pid=5339 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.473000 audit[5339]: CRED_DISP pid=5339 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:14.477200 systemd-logind[1721]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:17:14.477569 systemd[1]: sshd@13-172.31.23.196:22-147.75.109.163:51620.service: Deactivated successfully. Feb 9 19:17:14.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.23.196:22-147.75.109.163:51620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:14.478976 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:17:14.481838 systemd-logind[1721]: Removed session 14. Feb 9 19:17:19.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.196:22-147.75.109.163:50280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.500324 systemd[1]: Started sshd@14-172.31.23.196:22-147.75.109.163:50280.service. Feb 9 19:17:19.502811 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:17:19.502919 kernel: audit: type=1130 audit(1707506239.500:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.196:22-147.75.109.163:50280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.677000 audit[5386]: USER_ACCT pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.680308 sshd[5386]: Accepted publickey for core from 147.75.109.163 port 50280 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:19.683590 sshd[5386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:19.677000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.697688 kernel: audit: type=1101 audit(1707506239.677:1411): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.697854 kernel: audit: type=1103 audit(1707506239.677:1412): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.703660 kernel: audit: type=1006 audit(1707506239.677:1413): pid=5386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:17:19.677000 audit[5386]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5453180 a2=3 a3=1 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:19.714443 kernel: audit: type=1300 audit(1707506239.677:1413): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5453180 a2=3 a3=1 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:19.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:19.718653 kernel: audit: type=1327 audit(1707506239.677:1413): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:19.722530 systemd-logind[1721]: New session 15 of user core. Feb 9 19:17:19.724334 systemd[1]: Started session-15.scope. Feb 9 19:17:19.733000 audit[5386]: USER_START pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.745000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.755048 kernel: audit: type=1105 audit(1707506239.733:1414): pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.755193 kernel: audit: type=1103 audit(1707506239.745:1415): pid=5388 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.975605 sshd[5386]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:19.977000 audit[5386]: USER_END pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.978000 audit[5386]: CRED_DISP pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.989468 systemd[1]: sshd@14-172.31.23.196:22-147.75.109.163:50280.service: Deactivated successfully. Feb 9 19:17:19.990797 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:17:19.997898 kernel: audit: type=1106 audit(1707506239.977:1416): pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.998004 kernel: audit: type=1104 audit(1707506239.978:1417): pid=5386 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:19.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.196:22-147.75.109.163:50280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.999227 systemd-logind[1721]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:17:20.000874 systemd-logind[1721]: Removed session 15. Feb 9 19:17:21.073441 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.SgJL2F.mount: Deactivated successfully. Feb 9 19:17:25.005414 systemd[1]: Started sshd@15-172.31.23.196:22-147.75.109.163:45560.service. Feb 9 19:17:25.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.196:22-147.75.109.163:45560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:25.013284 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:17:25.013416 kernel: audit: type=1130 audit(1707506245.006:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.196:22-147.75.109.163:45560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:25.184000 audit[5417]: USER_ACCT pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.184857 sshd[5417]: Accepted publickey for core from 147.75.109.163 port 45560 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:25.196319 kernel: audit: type=1101 audit(1707506245.184:1420): pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.195000 audit[5417]: CRED_ACQ pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.197080 sshd[5417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:25.211723 kernel: audit: type=1103 audit(1707506245.195:1421): pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.211876 kernel: audit: type=1006 audit(1707506245.195:1422): pid=5417 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:17:25.195000 audit[5417]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8a9eba0 a2=3 a3=1 items=0 ppid=1 pid=5417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:25.222323 kernel: audit: type=1300 audit(1707506245.195:1422): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8a9eba0 a2=3 a3=1 items=0 ppid=1 pid=5417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:25.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:25.226415 kernel: audit: type=1327 audit(1707506245.195:1422): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:25.231158 systemd-logind[1721]: New session 16 of user core. Feb 9 19:17:25.233149 systemd[1]: Started session-16.scope. Feb 9 19:17:25.242000 audit[5417]: USER_START pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.254400 kernel: audit: type=1105 audit(1707506245.242:1423): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.254543 kernel: audit: type=1103 audit(1707506245.247:1424): pid=5419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.247000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.490994 sshd[5417]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:25.492000 audit[5417]: USER_END pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.496646 systemd-logind[1721]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:17:25.498027 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:17:25.499144 systemd[1]: sshd@15-172.31.23.196:22-147.75.109.163:45560.service: Deactivated successfully. Feb 9 19:17:25.502529 systemd-logind[1721]: Removed session 16. Feb 9 19:17:25.492000 audit[5417]: CRED_DISP pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.513308 kernel: audit: type=1106 audit(1707506245.492:1425): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.513455 kernel: audit: type=1104 audit(1707506245.492:1426): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:25.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.196:22-147.75.109.163:45560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:30.534089 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:17:30.534213 kernel: audit: type=1130 audit(1707506250.523:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.196:22-147.75.109.163:45574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:30.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.196:22-147.75.109.163:45574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:30.523142 systemd[1]: Started sshd@16-172.31.23.196:22-147.75.109.163:45574.service. Feb 9 19:17:30.694000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.697071 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:30.698896 sshd[5430]: Accepted publickey for core from 147.75.109.163 port 45574 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:30.705302 kernel: audit: type=1101 audit(1707506250.694:1429): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.705421 kernel: audit: type=1103 audit(1707506250.696:1430): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.696000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.713607 systemd[1]: Started session-17.scope. Feb 9 19:17:30.715826 systemd-logind[1721]: New session 17 of user core. Feb 9 19:17:30.721536 kernel: audit: type=1006 audit(1707506250.696:1431): pid=5430 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:17:30.696000 audit[5430]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d81170 a2=3 a3=1 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.731717 kernel: audit: type=1300 audit(1707506250.696:1431): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d81170 a2=3 a3=1 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:30.736085 kernel: audit: type=1327 audit(1707506250.696:1431): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:30.726000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.747715 kernel: audit: type=1105 audit(1707506250.726:1432): pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.736000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.756831 kernel: audit: type=1103 audit(1707506250.736:1433): pid=5432 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.964574 sshd[5430]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:30.966000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.966000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.978515 systemd[1]: sshd@16-172.31.23.196:22-147.75.109.163:45574.service: Deactivated successfully. Feb 9 19:17:30.979875 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:17:30.986874 kernel: audit: type=1106 audit(1707506250.966:1434): pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.987011 kernel: audit: type=1104 audit(1707506250.966:1435): pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:30.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.196:22-147.75.109.163:45574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:30.988214 systemd-logind[1721]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:17:30.990193 systemd-logind[1721]: Removed session 17. Feb 9 19:17:35.462792 kubelet[2973]: I0209 19:17:35.462743 2973 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:17:35.475569 systemd[1]: Created slice kubepods-besteffort-pod086df846_399c_48fd_9185_b7fe13b5af87.slice. Feb 9 19:17:35.492739 kubelet[2973]: W0209 19:17:35.492697 2973 reflector.go:424] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:17:35.492982 kubelet[2973]: E0209 19:17:35.492960 2973 reflector.go:140] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:17:35.493708 kubelet[2973]: W0209 19:17:35.493656 2973 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:17:35.493853 kubelet[2973]: E0209 19:17:35.493711 2973 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-23-196" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-23-196' and this object Feb 9 19:17:35.547698 kubelet[2973]: I0209 19:17:35.547652 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/086df846-399c-48fd-9185-b7fe13b5af87-calico-apiserver-certs\") pod \"calico-apiserver-595b9d68d4-xfndc\" (UID: \"086df846-399c-48fd-9185-b7fe13b5af87\") " pod="calico-apiserver/calico-apiserver-595b9d68d4-xfndc" Feb 9 19:17:35.547941 kubelet[2973]: I0209 19:17:35.547750 2973 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mcc8l\" (UniqueName: \"kubernetes.io/projected/086df846-399c-48fd-9185-b7fe13b5af87-kube-api-access-mcc8l\") pod \"calico-apiserver-595b9d68d4-xfndc\" (UID: \"086df846-399c-48fd-9185-b7fe13b5af87\") " pod="calico-apiserver/calico-apiserver-595b9d68d4-xfndc" Feb 9 19:17:35.666319 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:17:35.666434 kernel: audit: type=1325 audit(1707506255.660:1437): table=filter:121 family=2 entries=6 op=nft_register_rule pid=5468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.660000 audit[5468]: NETFILTER_CFG table=filter:121 family=2 entries=6 op=nft_register_rule pid=5468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.660000 audit[5468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffffe0dd80 a2=0 a3=ffff86ae96c0 items=0 ppid=3172 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.681944 kernel: audit: type=1300 audit(1707506255.660:1437): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffffe0dd80 a2=0 a3=ffff86ae96c0 items=0 ppid=3172 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.691283 kernel: audit: type=1327 audit(1707506255.660:1437): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.665000 audit[5468]: NETFILTER_CFG table=nat:122 family=2 entries=78 op=nft_register_rule pid=5468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.699754 kernel: audit: type=1325 audit(1707506255.665:1438): table=nat:122 family=2 entries=78 op=nft_register_rule pid=5468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.699908 kernel: audit: type=1300 audit(1707506255.665:1438): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffffe0dd80 a2=0 a3=ffff86ae96c0 items=0 ppid=3172 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.665000 audit[5468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffffe0dd80 a2=0 a3=ffff86ae96c0 items=0 ppid=3172 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.718733 kernel: audit: type=1327 audit(1707506255.665:1438): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.851000 audit[5494]: NETFILTER_CFG table=filter:123 family=2 entries=7 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.851000 audit[5494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffebc0aa50 a2=0 a3=ffffb33fd6c0 items=0 ppid=3172 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.869287 kernel: audit: type=1325 audit(1707506255.851:1439): table=filter:123 family=2 entries=7 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.869477 kernel: audit: type=1300 audit(1707506255.851:1439): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffebc0aa50 a2=0 a3=ffffb33fd6c0 items=0 ppid=3172 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.869542 kernel: audit: type=1327 audit(1707506255.851:1439): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.856000 audit[5494]: NETFILTER_CFG table=nat:124 family=2 entries=78 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.856000 audit[5494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffebc0aa50 a2=0 a3=ffffb33fd6c0 items=0 ppid=3172 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.883302 kernel: audit: type=1325 audit(1707506255.856:1440): table=nat:124 family=2 entries=78 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.997460 systemd[1]: Started sshd@17-172.31.23.196:22-147.75.109.163:41946.service. Feb 9 19:17:35.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.196:22-147.75.109.163:41946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.180000 audit[5496]: USER_ACCT pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.181626 sshd[5496]: Accepted publickey for core from 147.75.109.163 port 41946 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:36.186000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.191000 audit[5496]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea4f4860 a2=3 a3=1 items=0 ppid=1 pid=5496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:36.192177 sshd[5496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:36.203365 systemd-logind[1721]: New session 18 of user core. Feb 9 19:17:36.203817 systemd[1]: Started session-18.scope. Feb 9 19:17:36.216000 audit[5496]: USER_START pid=5496 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.219000 audit[5498]: CRED_ACQ pid=5498 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.474047 sshd[5496]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:36.475000 audit[5496]: USER_END pid=5496 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.476000 audit[5496]: CRED_DISP pid=5496 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.479247 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:17:36.481178 systemd[1]: sshd@17-172.31.23.196:22-147.75.109.163:41946.service: Deactivated successfully. Feb 9 19:17:36.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.196:22-147.75.109.163:41946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.481589 systemd-logind[1721]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:17:36.483876 systemd-logind[1721]: Removed session 18. Feb 9 19:17:36.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.23.196:22-147.75.109.163:41958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.502035 systemd[1]: Started sshd@18-172.31.23.196:22-147.75.109.163:41958.service. Feb 9 19:17:36.649495 kubelet[2973]: E0209 19:17:36.649438 2973 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 19:17:36.650110 kubelet[2973]: E0209 19:17:36.649564 2973 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/086df846-399c-48fd-9185-b7fe13b5af87-calico-apiserver-certs podName:086df846-399c-48fd-9185-b7fe13b5af87 nodeName:}" failed. No retries permitted until 2024-02-09 19:17:37.149531534 +0000 UTC m=+112.258139240 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/086df846-399c-48fd-9185-b7fe13b5af87-calico-apiserver-certs") pod "calico-apiserver-595b9d68d4-xfndc" (UID: "086df846-399c-48fd-9185-b7fe13b5af87") : failed to sync secret cache: timed out waiting for the condition Feb 9 19:17:36.674000 audit[5509]: USER_ACCT pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.674705 sshd[5509]: Accepted publickey for core from 147.75.109.163 port 41958 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:36.676000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.676000 audit[5509]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd97c60c0 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.676000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:36.678083 sshd[5509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:36.689174 kubelet[2973]: E0209 19:17:36.684735 2973 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:17:36.689174 kubelet[2973]: E0209 19:17:36.684781 2973 projected.go:198] Error preparing data for projected volume kube-api-access-mcc8l for pod calico-apiserver/calico-apiserver-595b9d68d4-xfndc: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:17:36.689174 kubelet[2973]: E0209 19:17:36.687960 2973 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/086df846-399c-48fd-9185-b7fe13b5af87-kube-api-access-mcc8l podName:086df846-399c-48fd-9185-b7fe13b5af87 nodeName:}" failed. No retries permitted until 2024-02-09 19:17:37.18487987 +0000 UTC m=+112.293487576 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-mcc8l" (UniqueName: "kubernetes.io/projected/086df846-399c-48fd-9185-b7fe13b5af87-kube-api-access-mcc8l") pod "calico-apiserver-595b9d68d4-xfndc" (UID: "086df846-399c-48fd-9185-b7fe13b5af87") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:17:36.686342 systemd-logind[1721]: New session 19 of user core. Feb 9 19:17:36.687133 systemd[1]: Started session-19.scope. Feb 9 19:17:36.700000 audit[5509]: USER_START pid=5509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.703000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.115659 sshd[5509]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:37.117000 audit[5509]: USER_END pid=5509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.118000 audit[5509]: CRED_DISP pid=5509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.121367 systemd[1]: sshd@18-172.31.23.196:22-147.75.109.163:41958.service: Deactivated successfully. Feb 9 19:17:37.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.23.196:22-147.75.109.163:41958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:37.123005 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:17:37.124561 systemd-logind[1721]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:17:37.126559 systemd-logind[1721]: Removed session 19. Feb 9 19:17:37.146138 systemd[1]: Started sshd@19-172.31.23.196:22-147.75.109.163:41972.service. Feb 9 19:17:37.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.196:22-147.75.109.163:41972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:37.288619 env[1733]: time="2024-02-09T19:17:37.288540540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-595b9d68d4-xfndc,Uid:086df846-399c-48fd-9185-b7fe13b5af87,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:17:37.342000 audit[5518]: USER_ACCT pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.342782 sshd[5518]: Accepted publickey for core from 147.75.109.163 port 41972 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:37.344000 audit[5518]: CRED_ACQ pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.345000 audit[5518]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe067ac50 a2=3 a3=1 items=0 ppid=1 pid=5518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:37.347140 sshd[5518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:37.358490 systemd[1]: Started session-20.scope. Feb 9 19:17:37.361741 systemd-logind[1721]: New session 20 of user core. Feb 9 19:17:37.373000 audit[5518]: USER_START pid=5518 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.378000 audit[5531]: CRED_ACQ pid=5531 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:37.580300 (udev-worker)[5548]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:17:37.595684 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:17:37.595843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid04f336eb2f: link becomes ready Feb 9 19:17:37.590558 systemd-networkd[1536]: calid04f336eb2f: Link UP Feb 9 19:17:37.596039 systemd-networkd[1536]: calid04f336eb2f: Gained carrier Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.423 [INFO][5522] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0 calico-apiserver-595b9d68d4- calico-apiserver 086df846-399c-48fd-9185-b7fe13b5af87 1041 0 2024-02-09 19:17:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:595b9d68d4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-23-196 calico-apiserver-595b9d68d4-xfndc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid04f336eb2f [] []}} ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.423 [INFO][5522] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.481 [INFO][5535] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" HandleID="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Workload="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.510 [INFO][5535] ipam_plugin.go 268: Auto assigning IP ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" HandleID="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Workload="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002fd930), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-23-196", "pod":"calico-apiserver-595b9d68d4-xfndc", "timestamp":"2024-02-09 19:17:37.481493214 +0000 UTC"}, Hostname:"ip-172-31-23-196", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.510 [INFO][5535] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.510 [INFO][5535] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.510 [INFO][5535] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-196' Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.513 [INFO][5535] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.521 [INFO][5535] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.529 [INFO][5535] ipam.go 489: Trying affinity for 192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.535 [INFO][5535] ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.540 [INFO][5535] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.540 [INFO][5535] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.546 [INFO][5535] ipam.go 1682: Creating new handle: k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5 Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.554 [INFO][5535] ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.565 [INFO][5535] ipam.go 1216: Successfully claimed IPs: [192.168.72.69/26] block=192.168.72.64/26 handle="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.565 [INFO][5535] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.69/26] handle="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" host="ip-172-31-23-196" Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.565 [INFO][5535] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:17:37.646124 env[1733]: 2024-02-09 19:17:37.565 [INFO][5535] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.72.69/26] IPv6=[] ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" HandleID="k8s-pod-network.414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Workload="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.569 [INFO][5522] k8s.go 385: Populated endpoint ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0", GenerateName:"calico-apiserver-595b9d68d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"086df846-399c-48fd-9185-b7fe13b5af87", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"595b9d68d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"", Pod:"calico-apiserver-595b9d68d4-xfndc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.72.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid04f336eb2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.569 [INFO][5522] k8s.go 386: Calico CNI using IPs: [192.168.72.69/32] ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.569 [INFO][5522] dataplane_linux.go 68: Setting the host side veth name to calid04f336eb2f ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.597 [INFO][5522] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.597 [INFO][5522] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0", GenerateName:"calico-apiserver-595b9d68d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"086df846-399c-48fd-9185-b7fe13b5af87", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"595b9d68d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-196", ContainerID:"414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5", Pod:"calico-apiserver-595b9d68d4-xfndc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.72.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid04f336eb2f", MAC:"d2:de:ac:f2:e5:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:17:37.647816 env[1733]: 2024-02-09 19:17:37.643 [INFO][5522] k8s.go 491: Wrote updated endpoint to datastore ContainerID="414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5" Namespace="calico-apiserver" Pod="calico-apiserver-595b9d68d4-xfndc" WorkloadEndpoint="ip--172--31--23--196-k8s-calico--apiserver--595b9d68d4--xfndc-eth0" Feb 9 19:17:37.698783 env[1733]: time="2024-02-09T19:17:37.698627184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:37.698783 env[1733]: time="2024-02-09T19:17:37.698726664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:37.699106 env[1733]: time="2024-02-09T19:17:37.698756232Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:37.702642 env[1733]: time="2024-02-09T19:17:37.702538022Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5 pid=5571 runtime=io.containerd.runc.v2 Feb 9 19:17:37.763065 systemd[1]: Started cri-containerd-414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5.scope. Feb 9 19:17:37.879000 audit[5603]: NETFILTER_CFG table=filter:125 family=2 entries=59 op=nft_register_chain pid=5603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:17:37.879000 audit[5603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffc32f69c0 a2=0 a3=ffff9a65ffa8 items=0 ppid=4288 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.879000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.893000 audit: BPF prog-id=188 op=LOAD Feb 9 19:17:37.894000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.894000 audit[5580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5571 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346137656161643862643636333666383165636465366166393432 Feb 9 19:17:37.894000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.894000 audit[5580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5571 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346137656161643862643636333666383165636465366166393432 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit: BPF prog-id=189 op=LOAD Feb 9 19:17:37.895000 audit[5580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5571 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346137656161643862643636333666383165636465366166393432 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.895000 audit: BPF prog-id=190 op=LOAD Feb 9 19:17:37.895000 audit[5580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5571 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346137656161643862643636333666383165636465366166393432 Feb 9 19:17:37.898000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:17:37.898000 audit: BPF prog-id=189 op=UNLOAD Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:37.899000 audit: BPF prog-id=191 op=LOAD Feb 9 19:17:37.899000 audit[5580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5571 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:37.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346137656161643862643636333666383165636465366166393432 Feb 9 19:17:38.012565 env[1733]: time="2024-02-09T19:17:38.012507542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-595b9d68d4-xfndc,Uid:086df846-399c-48fd-9185-b7fe13b5af87,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5\"" Feb 9 19:17:38.017382 env[1733]: time="2024-02-09T19:17:38.016763237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:17:39.326038 systemd-networkd[1536]: calid04f336eb2f: Gained IPv6LL Feb 9 19:17:40.852713 kernel: kauditd_printk_skb: 92 callbacks suppressed Feb 9 19:17:40.852926 kernel: audit: type=1400 audit(1707506260.840:1484): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.840000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.840000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.868340 kernel: audit: type=1400 audit(1707506260.840:1485): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.840000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4013cf6630 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.908848 kernel: audit: type=1300 audit(1707506260.840:1485): arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4013cf6630 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.908983 kernel: audit: type=1327 audit(1707506260.840:1485): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.849000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.927755 kernel: audit: type=1400 audit(1707506260.849:1486): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.849000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4013cf67b0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.940674 kernel: audit: type=1300 audit(1707506260.849:1486): arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4013cf67b0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.955921 kernel: audit: type=1327 audit(1707506260.849:1486): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.840000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4013bef2f0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.977316 kernel: audit: type=1300 audit(1707506260.840:1484): arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4013bef2f0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:40.860000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:41.002283 kernel: audit: type=1327 audit(1707506260.840:1484): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:40.860000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4013cfa320 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:41.023526 kernel: audit: type=1400 audit(1707506260.860:1487): avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:40.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:41.126000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:41.126000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4014052300 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:41.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:41.126000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:41.126000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4013f8b680 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:17:41.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:17:42.172220 env[1733]: time="2024-02-09T19:17:42.172132492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:42.177146 env[1733]: time="2024-02-09T19:17:42.177032137Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:42.182319 env[1733]: time="2024-02-09T19:17:42.181702113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:42.186239 env[1733]: time="2024-02-09T19:17:42.186156472Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:42.189775 env[1733]: time="2024-02-09T19:17:42.188102856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 19:17:42.192889 env[1733]: time="2024-02-09T19:17:42.192815696Z" level=info msg="CreateContainer within sandbox \"414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:17:42.232876 env[1733]: time="2024-02-09T19:17:42.232762583Z" level=info msg="CreateContainer within sandbox \"414a7eaad8bd6636f81ecde6af94253dfd253ee255ce79d43682b34708654fc5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b\"" Feb 9 19:17:42.234209 env[1733]: time="2024-02-09T19:17:42.234124373Z" level=info msg="StartContainer for \"a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b\"" Feb 9 19:17:42.332517 systemd[1]: run-containerd-runc-k8s.io-a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b-runc.KTGkKc.mount: Deactivated successfully. Feb 9 19:17:42.341561 systemd[1]: Started cri-containerd-a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b.scope. Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.391000 audit: BPF prog-id=192 op=LOAD Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5571 pid=5626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134336236643435373063653766346664346138633739383833316134 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5571 pid=5626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134336236643435373063653766346664346138633739383833316134 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit: BPF prog-id=193 op=LOAD Feb 9 19:17:42.392000 audit[5626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5571 pid=5626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134336236643435373063653766346664346138633739383833316134 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit: BPF prog-id=194 op=LOAD Feb 9 19:17:42.392000 audit[5626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5571 pid=5626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134336236643435373063653766346664346138633739383833316134 Feb 9 19:17:42.392000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:17:42.392000 audit: BPF prog-id=193 op=UNLOAD Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { perfmon } for pid=5626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit[5626]: AVC avc: denied { bpf } for pid=5626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:42.392000 audit: BPF prog-id=195 op=LOAD Feb 9 19:17:42.392000 audit[5626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5571 pid=5626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134336236643435373063653766346664346138633739383833316134 Feb 9 19:17:42.437000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.437000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.437000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002ba05c0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:42.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.437000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40019abd10 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:42.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.561246 sshd[5518]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:42.563000 audit[5518]: USER_END pid=5518 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:42.563000 audit[5518]: CRED_DISP pid=5518 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:42.566973 systemd[1]: sshd@19-172.31.23.196:22-147.75.109.163:41972.service: Deactivated successfully. Feb 9 19:17:42.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.196:22-147.75.109.163:41972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:42.568831 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:17:42.569239 systemd[1]: session-20.scope: Consumed 1.262s CPU time. Feb 9 19:17:42.570514 systemd-logind[1721]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:17:42.572521 systemd-logind[1721]: Removed session 20. Feb 9 19:17:42.597376 systemd[1]: Started sshd@20-172.31.23.196:22-147.75.109.163:41976.service. Feb 9 19:17:42.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.196:22-147.75.109.163:41976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:42.711466 env[1733]: time="2024-02-09T19:17:42.711231427Z" level=info msg="StartContainer for \"a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b\" returns successfully" Feb 9 19:17:42.729000 audit[5679]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=5679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:42.729000 audit[5679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd41d4ee0 a2=0 a3=ffffb9f426c0 items=0 ppid=3172 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:42.738000 audit[5679]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=5679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:42.738000 audit[5679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd41d4ee0 a2=0 a3=ffffb9f426c0 items=0 ppid=3172 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:42.794000 audit[5660]: USER_ACCT pid=5660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:42.795148 sshd[5660]: Accepted publickey for core from 147.75.109.163 port 41976 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:42.797000 audit[5660]: CRED_ACQ pid=5660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:42.797000 audit[5660]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdd4a8a0 a2=3 a3=1 items=0 ppid=1 pid=5660 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:42.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:42.798478 sshd[5660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:42.808348 systemd-logind[1721]: New session 21 of user core. Feb 9 19:17:42.810872 systemd[1]: Started session-21.scope. Feb 9 19:17:42.821000 audit[5660]: USER_START pid=5660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:42.824000 audit[5689]: CRED_ACQ pid=5689 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.104000 audit[5718]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:43.104000 audit[5718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=ffffc8a6b940 a2=0 a3=ffff86fc96c0 items=0 ppid=3172 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:43.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:43.118000 audit[5718]: NETFILTER_CFG table=nat:129 family=2 entries=78 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:43.118000 audit[5718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc8a6b940 a2=0 a3=ffff86fc96c0 items=0 ppid=3172 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:43.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:43.515845 sshd[5660]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:43.517000 audit[5660]: USER_END pid=5660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.517000 audit[5660]: CRED_DISP pid=5660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.521386 systemd-logind[1721]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:17:43.522079 systemd[1]: sshd@20-172.31.23.196:22-147.75.109.163:41976.service: Deactivated successfully. Feb 9 19:17:43.523556 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:17:43.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.196:22-147.75.109.163:41976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:43.528569 systemd-logind[1721]: Removed session 21. Feb 9 19:17:43.547873 systemd[1]: Started sshd@21-172.31.23.196:22-147.75.109.163:41982.service. Feb 9 19:17:43.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.23.196:22-147.75.109.163:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:43.730000 audit[5724]: USER_ACCT pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.730958 sshd[5724]: Accepted publickey for core from 147.75.109.163 port 41982 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:43.732000 audit[5724]: CRED_ACQ pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.732000 audit[5724]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf62ac70 a2=3 a3=1 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:43.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:43.733716 sshd[5724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:43.742231 systemd-logind[1721]: New session 22 of user core. Feb 9 19:17:43.745232 systemd[1]: Started session-22.scope. Feb 9 19:17:43.757000 audit[5724]: USER_START pid=5724 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:43.760000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:44.133359 sshd[5724]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:44.134000 audit[5724]: USER_END pid=5724 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:44.135000 audit[5724]: CRED_DISP pid=5724 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:44.138703 systemd-logind[1721]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:17:44.139326 systemd[1]: sshd@21-172.31.23.196:22-147.75.109.163:41982.service: Deactivated successfully. Feb 9 19:17:44.140848 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:17:44.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.23.196:22-147.75.109.163:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:44.143687 systemd-logind[1721]: Removed session 22. Feb 9 19:17:44.395000 audit[5760]: NETFILTER_CFG table=filter:130 family=2 entries=32 op=nft_register_rule pid=5760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:44.395000 audit[5760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=ffffd12f62f0 a2=0 a3=ffffa32e76c0 items=0 ppid=3172 pid=5760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:44.403000 audit[5760]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=5760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:44.403000 audit[5760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd12f62f0 a2=0 a3=ffffa32e76c0 items=0 ppid=3172 pid=5760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:46.117302 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 9 19:17:46.117500 kernel: audit: type=1400 audit(1707506266.106:1537): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_17_37.3498374305/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c500,c658 tclass=file permissive=0 Feb 9 19:17:46.106000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_17_37.3498374305/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c500,c658 tclass=file permissive=0 Feb 9 19:17:46.106000 audit[5637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008fad80 a2=fc6 a3=0 items=0 ppid=5571 pid=5637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 key=(null) Feb 9 19:17:46.106000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:17:46.142961 kernel: audit: type=1300 audit(1707506266.106:1537): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008fad80 a2=fc6 a3=0 items=0 ppid=5571 pid=5637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 key=(null) Feb 9 19:17:46.143112 kernel: audit: type=1327 audit(1707506266.106:1537): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:17:49.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.196:22-147.75.109.163:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:49.163565 systemd[1]: Started sshd@22-172.31.23.196:22-147.75.109.163:36872.service. Feb 9 19:17:49.174323 kernel: audit: type=1130 audit(1707506269.163:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.196:22-147.75.109.163:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:49.343000 audit[5788]: USER_ACCT pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.345345 sshd[5788]: Accepted publickey for core from 147.75.109.163 port 36872 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:49.347155 sshd[5788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:49.346000 audit[5788]: CRED_ACQ pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.363579 kernel: audit: type=1101 audit(1707506269.343:1539): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.363672 kernel: audit: type=1103 audit(1707506269.346:1540): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.370164 kernel: audit: type=1006 audit(1707506269.346:1541): pid=5788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:17:49.346000 audit[5788]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd158b980 a2=3 a3=1 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:49.380766 kernel: audit: type=1300 audit(1707506269.346:1541): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd158b980 a2=3 a3=1 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:49.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:49.385173 kernel: audit: type=1327 audit(1707506269.346:1541): proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:49.390537 systemd-logind[1721]: New session 23 of user core. Feb 9 19:17:49.390570 systemd[1]: Started session-23.scope. Feb 9 19:17:49.401000 audit[5788]: USER_START pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.414859 kernel: audit: type=1105 audit(1707506269.401:1542): pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.413000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.703570 sshd[5788]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:49.705000 audit[5788]: USER_END pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.705000 audit[5788]: CRED_DISP pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:49.710098 systemd-logind[1721]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:17:49.711612 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:17:49.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.196:22-147.75.109.163:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:49.714098 systemd[1]: sshd@22-172.31.23.196:22-147.75.109.163:36872.service: Deactivated successfully. Feb 9 19:17:49.716684 systemd-logind[1721]: Removed session 23. Feb 9 19:17:51.055196 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.FCIWhJ.mount: Deactivated successfully. Feb 9 19:17:51.355000 audit[5846]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.358461 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 19:17:51.358588 kernel: audit: type=1325 audit(1707506271.355:1547): table=filter:132 family=2 entries=20 op=nft_register_rule pid=5846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.355000 audit[5846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffda0556d0 a2=0 a3=ffff838ff6c0 items=0 ppid=3172 pid=5846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.376932 kernel: audit: type=1300 audit(1707506271.355:1547): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffda0556d0 a2=0 a3=ffff838ff6c0 items=0 ppid=3172 pid=5846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.382943 kernel: audit: type=1327 audit(1707506271.355:1547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.377000 audit[5846]: NETFILTER_CFG table=nat:133 family=2 entries=162 op=nft_register_chain pid=5846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.390140 kernel: audit: type=1325 audit(1707506271.377:1548): table=nat:133 family=2 entries=162 op=nft_register_chain pid=5846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.390374 kernel: audit: type=1300 audit(1707506271.377:1548): arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffda0556d0 a2=0 a3=ffff838ff6c0 items=0 ppid=3172 pid=5846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.377000 audit[5846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffda0556d0 a2=0 a3=ffff838ff6c0 items=0 ppid=3172 pid=5846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.407329 kernel: audit: type=1327 audit(1707506271.377:1548): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:53.346070 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.nFeAJa.mount: Deactivated successfully. Feb 9 19:17:54.737414 systemd[1]: Started sshd@23-172.31.23.196:22-147.75.109.163:53108.service. Feb 9 19:17:54.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.196:22-147.75.109.163:53108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:54.748298 kernel: audit: type=1130 audit(1707506274.737:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.196:22-147.75.109.163:53108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:54.917000 audit[5867]: USER_ACCT pid=5867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:54.917743 sshd[5867]: Accepted publickey for core from 147.75.109.163 port 53108 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:17:54.929319 kernel: audit: type=1101 audit(1707506274.917:1550): pid=5867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:54.930219 sshd[5867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:17:54.928000 audit[5867]: CRED_ACQ pid=5867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:54.945583 kernel: audit: type=1103 audit(1707506274.928:1551): pid=5867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:54.945719 kernel: audit: type=1006 audit(1707506274.929:1552): pid=5867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:17:54.929000 audit[5867]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe83013a0 a2=3 a3=1 items=0 ppid=1 pid=5867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:17:54.954569 systemd[1]: Started session-24.scope. Feb 9 19:17:54.955844 systemd-logind[1721]: New session 24 of user core. Feb 9 19:17:54.964000 audit[5867]: USER_START pid=5867 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:54.967000 audit[5869]: CRED_ACQ pid=5869 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:55.278489 sshd[5867]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:55.280000 audit[5867]: USER_END pid=5867 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:55.280000 audit[5867]: CRED_DISP pid=5867 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:55.283679 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:17:55.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.196:22-147.75.109.163:53108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:55.285044 systemd-logind[1721]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:17:55.285574 systemd[1]: sshd@23-172.31.23.196:22-147.75.109.163:53108.service: Deactivated successfully. Feb 9 19:17:55.288939 systemd-logind[1721]: Removed session 24. Feb 9 19:17:58.558000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.561146 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:17:58.561218 kernel: audit: type=1400 audit(1707506278.558:1558): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.558000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dbbec0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.582542 kernel: audit: type=1300 audit(1707506278.558:1558): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dbbec0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.582649 kernel: audit: type=1327 audit(1707506278.558:1558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.558000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.563000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.601947 kernel: audit: type=1400 audit(1707506278.563:1559): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.602018 kernel: audit: type=1300 audit(1707506278.563:1559): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400119aca0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.563000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400119aca0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.624220 kernel: audit: type=1327 audit(1707506278.563:1559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.565000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.633842 kernel: audit: type=1400 audit(1707506278.565:1560): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.565000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400119acc0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.646094 kernel: audit: type=1300 audit(1707506278.565:1560): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400119acc0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.646217 kernel: audit: type=1327 audit(1707506278.565:1560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:58.567000 audit[2671]: AVC avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.665546 kernel: audit: type=1400 audit(1707506278.567:1561): avc: denied { watch } for pid=2671 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:58.567000 audit[2671]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400119ade0 a2=fc6 a3=0 items=0 ppid=2488 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:17:58.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:00.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.23.196:22-147.75.109.163:53124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:00.308436 systemd[1]: Started sshd@24-172.31.23.196:22-147.75.109.163:53124.service. Feb 9 19:18:00.484000 audit[5888]: USER_ACCT pid=5888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.484752 sshd[5888]: Accepted publickey for core from 147.75.109.163 port 53124 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:00.486000 audit[5888]: CRED_ACQ pid=5888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.486000 audit[5888]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5d59360 a2=3 a3=1 items=0 ppid=1 pid=5888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.486000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:00.487941 sshd[5888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:00.497116 systemd[1]: Started session-25.scope. Feb 9 19:18:00.498227 systemd-logind[1721]: New session 25 of user core. Feb 9 19:18:00.508000 audit[5888]: USER_START pid=5888 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.511000 audit[5890]: CRED_ACQ pid=5890 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.797997 sshd[5888]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:00.800000 audit[5888]: USER_END pid=5888 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.800000 audit[5888]: CRED_DISP pid=5888 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:00.803833 systemd[1]: sshd@24-172.31.23.196:22-147.75.109.163:53124.service: Deactivated successfully. Feb 9 19:18:00.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.23.196:22-147.75.109.163:53124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:00.805344 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:18:00.806692 systemd-logind[1721]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:18:00.809185 systemd-logind[1721]: Removed session 25. Feb 9 19:18:05.837558 systemd[1]: Started sshd@25-172.31.23.196:22-147.75.109.163:46060.service. Feb 9 19:18:05.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.196:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:05.839908 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:18:05.840024 kernel: audit: type=1130 audit(1707506285.837:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.196:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:06.017000 audit[5903]: USER_ACCT pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.019851 sshd[5903]: Accepted publickey for core from 147.75.109.163 port 46060 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:06.029015 sshd[5903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:06.027000 audit[5903]: CRED_ACQ pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.039637 kernel: audit: type=1101 audit(1707506286.017:1572): pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.039800 kernel: audit: type=1103 audit(1707506286.027:1573): pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.049288 kernel: audit: type=1006 audit(1707506286.028:1574): pid=5903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:18:06.028000 audit[5903]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6c61940 a2=3 a3=1 items=0 ppid=1 pid=5903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:06.068193 kernel: audit: type=1300 audit(1707506286.028:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6c61940 a2=3 a3=1 items=0 ppid=1 pid=5903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:06.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:06.074273 kernel: audit: type=1327 audit(1707506286.028:1574): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:06.075576 systemd-logind[1721]: New session 26 of user core. Feb 9 19:18:06.076933 systemd[1]: Started session-26.scope. Feb 9 19:18:06.094000 audit[5903]: USER_START pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.097000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.117338 kernel: audit: type=1105 audit(1707506286.094:1575): pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.117495 kernel: audit: type=1103 audit(1707506286.097:1576): pid=5906 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.408547 sshd[5903]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:06.410000 audit[5903]: USER_END pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.412725 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:18:06.413866 systemd[1]: sshd@25-172.31.23.196:22-147.75.109.163:46060.service: Deactivated successfully. Feb 9 19:18:06.422983 systemd-logind[1721]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:18:06.424589 systemd-logind[1721]: Removed session 26. Feb 9 19:18:06.410000 audit[5903]: CRED_DISP pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.434702 kernel: audit: type=1106 audit(1707506286.410:1577): pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.434866 kernel: audit: type=1104 audit(1707506286.410:1578): pid=5903 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:06.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.196:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:07.326932 systemd[1]: run-containerd-runc-k8s.io-a43b6d4570ce7f4fd4a8c798831a479d2db460862b7e009d1351aacf1855ae4b-runc.boTZZF.mount: Deactivated successfully. Feb 9 19:18:07.398331 kubelet[2973]: I0209 19:18:07.398275 2973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-595b9d68d4-xfndc" podStartSLOduration=-9.223372004456602e+09 pod.CreationTimestamp="2024-02-09 19:17:35 +0000 UTC" firstStartedPulling="2024-02-09 19:17:38.015050915 +0000 UTC m=+113.123658621" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:43.135633099 +0000 UTC m=+118.244240853" watchObservedRunningTime="2024-02-09 19:18:07.398174575 +0000 UTC m=+142.506782341" Feb 9 19:18:07.513000 audit[5960]: NETFILTER_CFG table=filter:134 family=2 entries=7 op=nft_register_rule pid=5960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:07.513000 audit[5960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff69e9f20 a2=0 a3=ffff9dce86c0 items=0 ppid=3172 pid=5960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:07.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:07.522000 audit[5960]: NETFILTER_CFG table=nat:135 family=2 entries=205 op=nft_register_chain pid=5960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:07.522000 audit[5960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=70436 a0=3 a1=fffff69e9f20 a2=0 a3=ffff9dce86c0 items=0 ppid=3172 pid=5960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:07.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:07.739000 audit[5986]: NETFILTER_CFG table=filter:136 family=2 entries=6 op=nft_register_rule pid=5986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:07.739000 audit[5986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd178efe0 a2=0 a3=ffff88d416c0 items=0 ppid=3172 pid=5986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:07.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:07.748000 audit[5986]: NETFILTER_CFG table=nat:137 family=2 entries=212 op=nft_register_chain pid=5986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:07.748000 audit[5986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffd178efe0 a2=0 a3=ffff88d416c0 items=0 ppid=3172 pid=5986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:07.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:11.449728 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:18:11.449894 kernel: audit: type=1130 audit(1707506291.438:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.196:22-147.75.109.163:46068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:11.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.196:22-147.75.109.163:46068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:11.438476 systemd[1]: Started sshd@26-172.31.23.196:22-147.75.109.163:46068.service. Feb 9 19:18:11.616000 audit[5999]: USER_ACCT pid=5999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.617406 sshd[5999]: Accepted publickey for core from 147.75.109.163 port 46068 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:11.628000 audit[5999]: CRED_ACQ pid=5999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.630011 sshd[5999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:11.638304 kernel: audit: type=1101 audit(1707506291.616:1585): pid=5999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.638474 kernel: audit: type=1103 audit(1707506291.628:1586): pid=5999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.644713 kernel: audit: type=1006 audit(1707506291.629:1587): pid=5999 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:18:11.629000 audit[5999]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc57b3800 a2=3 a3=1 items=0 ppid=1 pid=5999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:11.657198 kernel: audit: type=1300 audit(1707506291.629:1587): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc57b3800 a2=3 a3=1 items=0 ppid=1 pid=5999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:11.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:11.661939 kernel: audit: type=1327 audit(1707506291.629:1587): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:11.663054 systemd-logind[1721]: New session 27 of user core. Feb 9 19:18:11.664984 systemd[1]: Started session-27.scope. Feb 9 19:18:11.675000 audit[5999]: USER_START pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.689910 kernel: audit: type=1105 audit(1707506291.675:1588): pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.688000 audit[6001]: CRED_ACQ pid=6001 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.702305 kernel: audit: type=1103 audit(1707506291.688:1589): pid=6001 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.972378 sshd[5999]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:11.974000 audit[5999]: USER_END pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.977545 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:18:11.978696 systemd[1]: sshd@26-172.31.23.196:22-147.75.109.163:46068.service: Deactivated successfully. Feb 9 19:18:11.974000 audit[5999]: CRED_DISP pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.986293 kernel: audit: type=1106 audit(1707506291.974:1590): pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.995529 systemd-logind[1721]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:18:11.996369 kernel: audit: type=1104 audit(1707506291.974:1591): pid=5999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:11.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.196:22-147.75.109.163:46068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:11.997394 systemd-logind[1721]: Removed session 27. Feb 9 19:18:17.004288 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:17.004471 kernel: audit: type=1130 audit(1707506297.000:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.196:22-147.75.109.163:49360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:17.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.196:22-147.75.109.163:49360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:17.000416 systemd[1]: Started sshd@27-172.31.23.196:22-147.75.109.163:49360.service. Feb 9 19:18:17.174000 audit[6010]: USER_ACCT pid=6010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.174984 sshd[6010]: Accepted publickey for core from 147.75.109.163 port 49360 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:17.186297 kernel: audit: type=1101 audit(1707506297.174:1594): pid=6010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.186000 audit[6010]: CRED_ACQ pid=6010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.187807 sshd[6010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:17.202754 kernel: audit: type=1103 audit(1707506297.186:1595): pid=6010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.202889 kernel: audit: type=1006 audit(1707506297.186:1596): pid=6010 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 19:18:17.186000 audit[6010]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6bfc470 a2=3 a3=1 items=0 ppid=1 pid=6010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.213101 kernel: audit: type=1300 audit(1707506297.186:1596): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6bfc470 a2=3 a3=1 items=0 ppid=1 pid=6010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:17.217283 kernel: audit: type=1327 audit(1707506297.186:1596): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:17.222375 systemd-logind[1721]: New session 28 of user core. Feb 9 19:18:17.223712 systemd[1]: Started session-28.scope. Feb 9 19:18:17.234000 audit[6010]: USER_START pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.246291 kernel: audit: type=1105 audit(1707506297.234:1597): pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.246000 audit[6013]: CRED_ACQ pid=6013 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.256295 kernel: audit: type=1103 audit(1707506297.246:1598): pid=6013 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.622620 sshd[6010]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:17.624000 audit[6010]: USER_END pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.624000 audit[6010]: CRED_DISP pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.637642 systemd[1]: sshd@27-172.31.23.196:22-147.75.109.163:49360.service: Deactivated successfully. Feb 9 19:18:17.638947 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:18:17.646370 kernel: audit: type=1106 audit(1707506297.624:1599): pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.646500 kernel: audit: type=1104 audit(1707506297.624:1600): pid=6010 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:17.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.196:22-147.75.109.163:49360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:17.647646 systemd-logind[1721]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:18:17.649645 systemd-logind[1721]: Removed session 28. Feb 9 19:18:18.389443 systemd[1]: run-containerd-runc-k8s.io-b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d-runc.Xym9or.mount: Deactivated successfully. Feb 9 19:18:21.055774 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.XhH7Wy.mount: Deactivated successfully. Feb 9 19:18:22.655345 systemd[1]: Started sshd@28-172.31.23.196:22-147.75.109.163:49364.service. Feb 9 19:18:22.666815 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:22.666925 kernel: audit: type=1130 audit(1707506302.655:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.196:22-147.75.109.163:49364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:22.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.196:22-147.75.109.163:49364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:22.828000 audit[6068]: USER_ACCT pid=6068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.829087 sshd[6068]: Accepted publickey for core from 147.75.109.163 port 49364 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:22.840413 kernel: audit: type=1101 audit(1707506302.828:1603): pid=6068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.841657 sshd[6068]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:22.840000 audit[6068]: CRED_ACQ pid=6068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.857598 kernel: audit: type=1103 audit(1707506302.840:1604): pid=6068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.857728 kernel: audit: type=1006 audit(1707506302.840:1605): pid=6068 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 19:18:22.840000 audit[6068]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffced3a30 a2=3 a3=1 items=0 ppid=1 pid=6068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.867840 kernel: audit: type=1300 audit(1707506302.840:1605): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffced3a30 a2=3 a3=1 items=0 ppid=1 pid=6068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:22.871688 kernel: audit: type=1327 audit(1707506302.840:1605): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:22.876520 systemd-logind[1721]: New session 29 of user core. Feb 9 19:18:22.877648 systemd[1]: Started session-29.scope. Feb 9 19:18:22.887000 audit[6068]: USER_START pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.899000 audit[6070]: CRED_ACQ pid=6070 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.908968 kernel: audit: type=1105 audit(1707506302.887:1606): pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.909103 kernel: audit: type=1103 audit(1707506302.899:1607): pid=6070 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:23.135632 sshd[6068]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:23.137000 audit[6068]: USER_END pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:23.140000 audit[6068]: CRED_DISP pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:23.149960 systemd[1]: sshd@28-172.31.23.196:22-147.75.109.163:49364.service: Deactivated successfully. Feb 9 19:18:23.151332 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 19:18:23.158715 kernel: audit: type=1106 audit(1707506303.137:1608): pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:23.158900 kernel: audit: type=1104 audit(1707506303.140:1609): pid=6068 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:23.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.196:22-147.75.109.163:49364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:23.160187 systemd-logind[1721]: Session 29 logged out. Waiting for processes to exit. Feb 9 19:18:23.162375 systemd-logind[1721]: Removed session 29. Feb 9 19:18:36.550681 systemd[1]: cri-containerd-dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e.scope: Deactivated successfully. Feb 9 19:18:36.551405 systemd[1]: cri-containerd-dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e.scope: Consumed 6.777s CPU time. Feb 9 19:18:36.554000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:18:36.556533 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:36.556636 kernel: audit: type=1334 audit(1707506316.554:1611): prog-id=89 op=UNLOAD Feb 9 19:18:36.554000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:18:36.561739 kernel: audit: type=1334 audit(1707506316.554:1612): prog-id=101 op=UNLOAD Feb 9 19:18:36.652269 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e-rootfs.mount: Deactivated successfully. Feb 9 19:18:36.654951 env[1733]: time="2024-02-09T19:18:36.654871878Z" level=info msg="shim disconnected" id=dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e Feb 9 19:18:36.655597 env[1733]: time="2024-02-09T19:18:36.654944851Z" level=warning msg="cleaning up after shim disconnected" id=dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e namespace=k8s.io Feb 9 19:18:36.655597 env[1733]: time="2024-02-09T19:18:36.654974779Z" level=info msg="cleaning up dead shim" Feb 9 19:18:36.670213 env[1733]: time="2024-02-09T19:18:36.670149804Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:18:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6096 runtime=io.containerd.runc.v2\n" Feb 9 19:18:37.034338 systemd[1]: cri-containerd-0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460.scope: Deactivated successfully. Feb 9 19:18:37.034912 systemd[1]: cri-containerd-0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460.scope: Consumed 10.526s CPU time. Feb 9 19:18:37.034000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:18:37.039000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:18:37.042746 kernel: audit: type=1334 audit(1707506317.034:1613): prog-id=126 op=UNLOAD Feb 9 19:18:37.042929 kernel: audit: type=1334 audit(1707506317.039:1614): prog-id=129 op=UNLOAD Feb 9 19:18:37.076501 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460-rootfs.mount: Deactivated successfully. Feb 9 19:18:37.079864 env[1733]: time="2024-02-09T19:18:37.079793477Z" level=info msg="shim disconnected" id=0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460 Feb 9 19:18:37.080050 env[1733]: time="2024-02-09T19:18:37.079870362Z" level=warning msg="cleaning up after shim disconnected" id=0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460 namespace=k8s.io Feb 9 19:18:37.080050 env[1733]: time="2024-02-09T19:18:37.079893798Z" level=info msg="cleaning up dead shim" Feb 9 19:18:37.094504 env[1733]: time="2024-02-09T19:18:37.094431030Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:18:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6122 runtime=io.containerd.runc.v2\n" Feb 9 19:18:37.220894 kubelet[2973]: I0209 19:18:37.220129 2973 scope.go:115] "RemoveContainer" containerID="0e08318d78eb7ece0a80e6212b1c6ad916783babd4adbb7261281bddfa719460" Feb 9 19:18:37.225474 env[1733]: time="2024-02-09T19:18:37.225421350Z" level=info msg="CreateContainer within sandbox \"223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 19:18:37.229095 kubelet[2973]: I0209 19:18:37.228310 2973 scope.go:115] "RemoveContainer" containerID="dbd8f0b805af2890dcb9e5eb060d44a198cb4c3a352055bbf0971a84f09fab4e" Feb 9 19:18:37.233596 env[1733]: time="2024-02-09T19:18:37.233538685Z" level=info msg="CreateContainer within sandbox \"89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 19:18:37.253872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount447900684.mount: Deactivated successfully. Feb 9 19:18:37.280777 env[1733]: time="2024-02-09T19:18:37.280700934Z" level=info msg="CreateContainer within sandbox \"223eacc5d84145e8f04fb7a8f17093f4ab8929175890672140da159842343b80\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"fee231ef15b2db05bd5f92579fe74e7d595bae0886b176723ab7a3060e944f42\"" Feb 9 19:18:37.281591 env[1733]: time="2024-02-09T19:18:37.281538073Z" level=info msg="StartContainer for \"fee231ef15b2db05bd5f92579fe74e7d595bae0886b176723ab7a3060e944f42\"" Feb 9 19:18:37.285151 env[1733]: time="2024-02-09T19:18:37.285083922Z" level=info msg="CreateContainer within sandbox \"89387764bd1067a220682a214bf818ac8a8d6c5dc99ebdb61c50f11a42d8bff4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"7cc5d131ae82431625b81ee2196f6e43aabde3444e1e1e5f25b992dd655c8867\"" Feb 9 19:18:37.286485 env[1733]: time="2024-02-09T19:18:37.286340813Z" level=info msg="StartContainer for \"7cc5d131ae82431625b81ee2196f6e43aabde3444e1e1e5f25b992dd655c8867\"" Feb 9 19:18:37.320672 systemd[1]: Started cri-containerd-fee231ef15b2db05bd5f92579fe74e7d595bae0886b176723ab7a3060e944f42.scope. Feb 9 19:18:37.360290 systemd[1]: Started cri-containerd-7cc5d131ae82431625b81ee2196f6e43aabde3444e1e1e5f25b992dd655c8867.scope. Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435275 kernel: audit: type=1400 audit(1707506317.426:1615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.458073 kernel: audit: type=1400 audit(1707506317.426:1616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.458216 kernel: audit: type=1400 audit(1707506317.426:1617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.471934 kernel: audit: type=1400 audit(1707506317.426:1618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.482300 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:18:37.482465 kernel: audit: audit_lost=58 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.433000 audit: BPF prog-id=196 op=LOAD Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2488 pid=6169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633564313331616538323433313632356238316565323139366636 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2488 pid=6169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633564313331616538323433313632356238316565323139366636 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit: BPF prog-id=197 op=LOAD Feb 9 19:18:37.434000 audit[6169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2488 pid=6169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633564313331616538323433313632356238316565323139366636 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.434000 audit: BPF prog-id=198 op=LOAD Feb 9 19:18:37.434000 audit[6169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2488 pid=6169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633564313331616538323433313632356238316565323139366636 Feb 9 19:18:37.435000 audit: BPF prog-id=198 op=UNLOAD Feb 9 19:18:37.435000 audit: BPF prog-id=197 op=UNLOAD Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { perfmon } for pid=6169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit[6169]: AVC avc: denied { bpf } for pid=6169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.435000 audit: BPF prog-id=199 op=LOAD Feb 9 19:18:37.435000 audit[6169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2488 pid=6169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633564313331616538323433313632356238316565323139366636 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:37.543054 env[1733]: time="2024-02-09T19:18:37.542547066Z" level=info msg="StartContainer for \"fee231ef15b2db05bd5f92579fe74e7d595bae0886b176723ab7a3060e944f42\" returns successfully" Feb 9 19:18:37.551195 env[1733]: time="2024-02-09T19:18:37.551119289Z" level=info msg="StartContainer for \"7cc5d131ae82431625b81ee2196f6e43aabde3444e1e1e5f25b992dd655c8867\" returns successfully" Feb 9 19:18:37.657743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3049347319.mount: Deactivated successfully. Feb 9 19:18:37.850626 kubelet[2973]: E0209 19:18:37.850481 2973 controller.go:189] failed to update lease, error: Put "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:18:40.372000 audit[6187]: AVC avc: denied { watch } for pid=6187 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.372000 audit[6187]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000576c60 a2=fc6 a3=0 items=0 ppid=2488 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:18:40.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:40.373000 audit[6187]: AVC avc: denied { watch } for pid=6187 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.373000 audit[6187]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40001541c0 a2=fc6 a3=0 items=0 ppid=2488 pid=6187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c806 key=(null) Feb 9 19:18:40.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:40.841000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.841000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4014d0e2d0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:40.841000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:40.850000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.850000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4014d0e360 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:40.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:40.855000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.855000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4014d0e450 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:40.855000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:40.861000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:40.861000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=400d666200 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:40.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:41.126000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:41.126000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4014b71ce0 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:41.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:41.128000 audit[2656]: AVC avc: denied { watch } for pid=2656 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:41.128000 audit[2656]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=400d666220 a2=fc6 a3=0 items=0 ppid=2502 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c770,c884 key=(null) Feb 9 19:18:41.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 19:18:41.634911 systemd[1]: cri-containerd-d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f.scope: Deactivated successfully. Feb 9 19:18:41.635483 systemd[1]: cri-containerd-d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f.scope: Consumed 4.817s CPU time. Feb 9 19:18:41.645568 kernel: kauditd_printk_skb: 202 callbacks suppressed Feb 9 19:18:41.645724 kernel: audit: type=1334 audit(1707506321.639:1648): prog-id=93 op=UNLOAD Feb 9 19:18:41.639000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:18:41.639000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:18:41.649466 kernel: audit: type=1334 audit(1707506321.639:1649): prog-id=94 op=UNLOAD Feb 9 19:18:41.681728 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f-rootfs.mount: Deactivated successfully. Feb 9 19:18:41.683738 env[1733]: time="2024-02-09T19:18:41.683676941Z" level=info msg="shim disconnected" id=d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f Feb 9 19:18:41.684622 env[1733]: time="2024-02-09T19:18:41.684576486Z" level=warning msg="cleaning up after shim disconnected" id=d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f namespace=k8s.io Feb 9 19:18:41.684717 env[1733]: time="2024-02-09T19:18:41.684625866Z" level=info msg="cleaning up dead shim" Feb 9 19:18:41.700035 env[1733]: time="2024-02-09T19:18:41.699955209Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:18:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6241 runtime=io.containerd.runc.v2\n" Feb 9 19:18:42.255730 kubelet[2973]: I0209 19:18:42.255670 2973 scope.go:115] "RemoveContainer" containerID="d79092e055347196c4c2c2f912dc5663f67180e8cfd3f612acabcb8f1557fd5f" Feb 9 19:18:42.259348 env[1733]: time="2024-02-09T19:18:42.259235267Z" level=info msg="CreateContainer within sandbox \"6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 19:18:42.283924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2344097122.mount: Deactivated successfully. Feb 9 19:18:42.299900 env[1733]: time="2024-02-09T19:18:42.299814523Z" level=info msg="CreateContainer within sandbox \"6bdc3e10fb95061af28e70c932ac8ba46412bc70cb9706099f7496273365666e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"2fc757809edbc80ff11213e324a9cf80d91665a4647f3e72693e03ee4b8eea52\"" Feb 9 19:18:42.301001 env[1733]: time="2024-02-09T19:18:42.300925184Z" level=info msg="StartContainer for \"2fc757809edbc80ff11213e324a9cf80d91665a4647f3e72693e03ee4b8eea52\"" Feb 9 19:18:42.331028 systemd[1]: Started cri-containerd-2fc757809edbc80ff11213e324a9cf80d91665a4647f3e72693e03ee4b8eea52.scope. Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374500 kernel: audit: type=1400 audit(1707506322.366:1650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389265 kernel: audit: type=1400 audit(1707506322.366:1651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389367 kernel: audit: type=1400 audit(1707506322.366:1652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.397030 kernel: audit: type=1400 audit(1707506322.366:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.416669 kernel: audit: type=1400 audit(1707506322.366:1654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.416805 kernel: audit: type=1400 audit(1707506322.366:1655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.424689 kernel: audit: type=1400 audit(1707506322.366:1656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.432136 kernel: audit: type=1400 audit(1707506322.366:1657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.373000 audit: BPF prog-id=204 op=LOAD Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2529 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:42.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633735373830396564626338306666313132313365333234613963 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2529 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:42.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633735373830396564626338306666313132313365333234613963 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.374000 audit: BPF prog-id=205 op=LOAD Feb 9 19:18:42.374000 audit[6263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2529 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:42.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633735373830396564626338306666313132313365333234613963 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.381000 audit: BPF prog-id=206 op=LOAD Feb 9 19:18:42.381000 audit[6263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2529 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:42.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633735373830396564626338306666313132313365333234613963 Feb 9 19:18:42.389000 audit: BPF prog-id=206 op=UNLOAD Feb 9 19:18:42.389000 audit: BPF prog-id=205 op=UNLOAD Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { perfmon } for pid=6263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit[6263]: AVC avc: denied { bpf } for pid=6263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:42.389000 audit: BPF prog-id=207 op=LOAD Feb 9 19:18:42.389000 audit[6263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2529 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:42.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633735373830396564626338306666313132313365333234613963 Feb 9 19:18:42.462100 env[1733]: time="2024-02-09T19:18:42.462034035Z" level=info msg="StartContainer for \"2fc757809edbc80ff11213e324a9cf80d91665a4647f3e72693e03ee4b8eea52\" returns successfully" Feb 9 19:18:46.126000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_17_37.3498374305/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c500,c658 tclass=file permissive=0 Feb 9 19:18:46.126000 audit[5637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001894aa0 a2=fc6 a3=0 items=0 ppid=5571 pid=5637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c658 key=(null) Feb 9 19:18:46.126000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:18:47.851114 kubelet[2973]: E0209 19:18:47.851052 2973 controller.go:189] failed to update lease, error: Put "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:18:48.375318 systemd[1]: run-containerd-runc-k8s.io-b6ef95373ddd4f7f42d7decf8bcf47f7b7cb71c4518cc16319bcf1f60235c65d-runc.he8xJI.mount: Deactivated successfully. Feb 9 19:18:51.053082 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.DnwqKJ.mount: Deactivated successfully. Feb 9 19:18:53.347938 systemd[1]: run-containerd-runc-k8s.io-f09eaaaf731986f8f39a3a5ad845b1e0f7ac61461575e12d5003d361dd54b35e-runc.1damDg.mount: Deactivated successfully. Feb 9 19:18:57.852511 kubelet[2973]: E0209 19:18:57.852441 2973 controller.go:189] failed to update lease, error: Put "https://172.31.23.196:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-196?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)